Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DOC_PDF.exe

Overview

General Information

Sample name:DOC_PDF.exe
Analysis ID:1519409
MD5:debff2e29172e4c6b07a62a5d7b8a6b4
SHA1:6e2073a1f0dbd338f0a8673f35b8628581fac402
SHA256:874c6faee7e17445012c0f573c29dde997a71cc86e15fc3152a22365cf83bdf1
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to resolve many domain names, but no domain seems valid
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • DOC_PDF.exe (PID: 6620 cmdline: "C:\Users\user\Desktop\DOC_PDF.exe" MD5: DEBFF2E29172E4C6B07A62A5D7B8A6B4)
    • DOC_PDF.exe (PID: 5740 cmdline: "C:\Users\user\Desktop\DOC_PDF.exe" MD5: DEBFF2E29172E4C6B07A62A5D7B8A6B4)
      • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • msdt.exe (PID: 4320 cmdline: "C:\Windows\SysWOW64\msdt.exe" MD5: BAA4458E429E7C906560FE4541ADFCFB)
          • cmd.exe (PID: 1200 cmdline: /c del "C:\Users\user\Desktop\DOC_PDF.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 list": ["www.awlc7038.vip/b31a/"], "decoy": ["enjamin-paaac.buzz", "mail-marketing-40950.bond", "pusems28-post.cyou", "hindo.top", "ruck-company-be.today", "asinos-deutschland.net", "ewancash.boats", "etdopovo.casino", "rcher-saaac.buzz", "871166.vip", "manuel.app", "g3yqo.shop", "-9way.xyz", "qawgytfexe.bond", "iefi6834.vip", "ental-health-35901.bond", "idat-merkez18.top", "rojectleadzone.website", "lirudolph.top", "migloballlc.online", "utebolshirts.shop", "i-tools-57602.bond", "itchen-889.bond", "hewieandfriends.info", "tlchurch.net", "arolmodasgpuava.online", "indjuvedermdoctorsnearby.today", "auwin-daftar.xyz", "arden-sheds-23886.bond", "2239d3.christmas", "irablog.xyz", "remation-services-88863.bond", "ehxk3u7.forum", "resdai.xyz", "61pk48ln.autos", "-web-p102.buzz", "eb2125.info", "ole-xaaaa.buzz", "lc-driving-school.net", "igh-class-jewelry.info", "66gd660du.bond", "ixi.asia", "aemoruhagic.click", "entalcare-us2-borysfb.today", "olf-cart-82894.bond", "algrup.net", "usanscanneritaly63.sbs", "ames666.xyz", "ockycanada.net", "bykmr.shop", "gpmedia.app", "avada-ga-34.press", "igraine-treatment-33058.bond", "heodore-saaab.buzz", "ashforhouse19.online", "48827496.top", "mazonun.top", "lstrk.fun", "hegdg.net", "nssmodule.center", "sksiniaja7.buzz", "uneytozgur.online", "orri.shop", "ras-us-1.bond"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cb80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b8e7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c8ea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18809:$sqlite3step: 68 34 1C 7B E1
      • 0x1891c:$sqlite3step: 68 34 1C 7B E1
      • 0x18838:$sqlite3text: 68 38 2A 90 C5
      • 0x1895d:$sqlite3text: 68 38 2A 90 C5
      • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 30 entries
      SourceRuleDescriptionAuthorStrings
      3.2.DOC_PDF.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        3.2.DOC_PDF.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          3.2.DOC_PDF.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x5451:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1bd80:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x9bbf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x14aa7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          3.2.DOC_PDF.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x148a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x149a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x978a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1360c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa483:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1aae7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1baea:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          3.2.DOC_PDF.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17a09:$sqlite3step: 68 34 1C 7B E1
          • 0x17b1c:$sqlite3step: 68 34 1C 7B E1
          • 0x17a38:$sqlite3text: 68 38 2A 90 C5
          • 0x17b5d:$sqlite3text: 68 38 2A 90 C5
          • 0x17a4b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x17b73:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 5 entries
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.awlc7038.vip/b31a/"], "decoy": ["enjamin-paaac.buzz", "mail-marketing-40950.bond", "pusems28-post.cyou", "hindo.top", "ruck-company-be.today", "asinos-deutschland.net", "ewancash.boats", "etdopovo.casino", "rcher-saaac.buzz", "871166.vip", "manuel.app", "g3yqo.shop", "-9way.xyz", "qawgytfexe.bond", "iefi6834.vip", "ental-health-35901.bond", "idat-merkez18.top", "rojectleadzone.website", "lirudolph.top", "migloballlc.online", "utebolshirts.shop", "i-tools-57602.bond", "itchen-889.bond", "hewieandfriends.info", "tlchurch.net", "arolmodasgpuava.online", "indjuvedermdoctorsnearby.today", "auwin-daftar.xyz", "arden-sheds-23886.bond", "2239d3.christmas", "irablog.xyz", "remation-services-88863.bond", "ehxk3u7.forum", "resdai.xyz", "61pk48ln.autos", "-web-p102.buzz", "eb2125.info", "ole-xaaaa.buzz", "lc-driving-school.net", "igh-class-jewelry.info", "66gd660du.bond", "ixi.asia", "aemoruhagic.click", "entalcare-us2-borysfb.today", "olf-cart-82894.bond", "algrup.net", "usanscanneritaly63.sbs", "ames666.xyz", "ockycanada.net", "bykmr.shop", "gpmedia.app", "avada-ga-34.press", "igraine-treatment-33058.bond", "heodore-saaab.buzz", "ashforhouse19.online", "48827496.top", "mazonun.top", "lstrk.fun", "hegdg.net", "nssmodule.center", "sksiniaja7.buzz", "uneytozgur.online", "orri.shop", "ras-us-1.bond"]}
          Source: DOC_PDF.exeReversingLabs: Detection: 58%
          Source: Yara matchFile source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: DOC_PDF.exeJoe Sandbox ML: detected
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002BAFB8 CertGetCertificateContextProperty,GetLastError,CryptHashCertificate,GetLastError,GetLastError,CertFreeCertificateContext,5_2_002BAFB8
          Source: DOC_PDF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: DOC_PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: msdt.pdbGCTL source: DOC_PDF.exe, 00000003.00000002.2104291686.0000000001D30000.00000040.10000000.00040000.00000000.sdmp, msdt.exe, 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: DOC_PDF.exe, 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000003.2106101852.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000003.2102931452.0000000004D30000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: DOC_PDF.exe, DOC_PDF.exe, 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, msdt.exe, 00000005.00000003.2106101852.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000003.2102931452.0000000004D30000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mJGu.pdb source: DOC_PDF.exe
          Source: Binary string: mJGu.pdbSHA256 source: DOC_PDF.exe
          Source: Binary string: msdt.pdb source: DOC_PDF.exe, 00000003.00000002.2104291686.0000000001D30000.00000040.10000000.00040000.00000000.sdmp, msdt.exe, msdt.exe, 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B602D GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,SetFileAttributesW,GetLastError,DeleteFileW,GetLastError,FindNextFileW,FindClose,RemoveDirectoryW,GetLastError,GetProcessHeap,HeapFree,5_2_002B602D
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C60A8 memset,GetProcessHeap,HeapAlloc,FindFirstFileW,GetProcessHeap,HeapAlloc,GetLastError,FindClose,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_002C60A8
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B1B92 memset,GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,5_2_002B1B92
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B5C20 memset,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,CloseHandle,FindFirstFileW,_wcsicmp,_wcsicmp,GetFileAttributesW,SetFileAttributesW,GetLastError,GetFileAttributesW,SetFileAttributesW,GetLastError,DeleteFileW,CreateFileW,GetLastError,CloseHandle,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,CloseHandle,CloseHandle,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_002B5C20
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C743A memset,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,CopyFileW,GetLastError,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_002C743A
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B4CB6 memset,GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,5_2_002B4CB6
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B4EDC memset,GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,5_2_002B4EDC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 4x nop then jmp 08358EFBh0_2_08358D68
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 4x nop then pop edi3_2_00416C96
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 4x nop then pop edi5_2_02E86C96

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.awlc7038.vip/b31a/
          Source: unknownDNS traffic detected: query: www.awlc7038.vip replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.rojectleadzone.website replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.hegdg.net replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.ewancash.boats replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.48827496.top replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.bykmr.shop replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.igh-class-jewelry.info replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.hewieandfriends.info replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.aemoruhagic.click replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.utebolshirts.shop replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.olf-cart-82894.bond replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.awlc7038.vip replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.rojectleadzone.website replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.hegdg.net replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.ewancash.boats replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.48827496.top replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.bykmr.shop replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.igh-class-jewelry.info replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.hewieandfriends.info replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.aemoruhagic.click replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.utebolshirts.shop replaycode: Name error (3)
          Source: unknownDNS traffic detected: query: www.olf-cart-82894.bond replaycode: Name error (3)
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: www.awlc7038.vip
          Source: global trafficDNS traffic detected: DNS query: www.rojectleadzone.website
          Source: global trafficDNS traffic detected: DNS query: www.olf-cart-82894.bond
          Source: global trafficDNS traffic detected: DNS query: www.hewieandfriends.info
          Source: global trafficDNS traffic detected: DNS query: www.ewancash.boats
          Source: global trafficDNS traffic detected: DNS query: www.igh-class-jewelry.info
          Source: global trafficDNS traffic detected: DNS query: www.48827496.top
          Source: global trafficDNS traffic detected: DNS query: www.bykmr.shop
          Source: global trafficDNS traffic detected: DNS query: www.utebolshirts.shop
          Source: global trafficDNS traffic detected: DNS query: www.hegdg.net
          Source: global trafficDNS traffic detected: DNS query: www.aemoruhagic.click
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: explorer.exe, 00000004.00000000.2043320694.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4502583953.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B0B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000004.00000003.3094195569.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000004.00000000.2057955900.0000000008870000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000002.4508804572.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2057404332.0000000007DC0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.-web-p102.buzz
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.-web-p102.buzz/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.-web-p102.buzz/b31a/www.indjuvedermdoctorsnearby.today
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.-web-p102.buzzReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2239d3.christmas
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2239d3.christmas/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2239d3.christmas/b31a/h
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2239d3.christmasReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.48827496.top
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.48827496.top/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.48827496.top/b31a/www.bykmr.shop
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.48827496.topReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aemoruhagic.click
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aemoruhagic.click/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aemoruhagic.click/b31a/www.-web-p102.buzz
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.aemoruhagic.clickReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ashforhouse19.online
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ashforhouse19.online/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ashforhouse19.online/b31a/www.2239d3.christmas
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ashforhouse19.onlineReferer:
          Source: explorer.exe, 00000004.00000003.3825649798.000000000C8EB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095300966.000000000C8E8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3102191852.000000000C8EB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3093866051.000000000C8E8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2062761599.000000000C8E8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.E
          Source: explorer.exe, 00000004.00000000.2062761599.000000000C8BC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095300966.000000000C8DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3093866051.000000000C8BC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.awlc7038.vip
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.awlc7038.vip/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.awlc7038.vip/b31a/www.rojectleadzone.website
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.awlc7038.vipReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bykmr.shop
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bykmr.shop/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bykmr.shop/b31a/www.utebolshirts.shop
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bykmr.shopReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ewancash.boats
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ewancash.boats/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ewancash.boats/b31a/www.igh-class-jewelry.info
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ewancash.boatsReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hegdg.net
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hegdg.net/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hegdg.net/b31a/www.aemoruhagic.click
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hegdg.netReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hewieandfriends.info
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hewieandfriends.info/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hewieandfriends.info/b31a/www.ewancash.boats
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.hewieandfriends.infoReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.igh-class-jewelry.info
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.igh-class-jewelry.info/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.igh-class-jewelry.info/b31a/www.48827496.top
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.igh-class-jewelry.infoReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.indjuvedermdoctorsnearby.today
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.indjuvedermdoctorsnearby.today/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.indjuvedermdoctorsnearby.today/b31a/www.ashforhouse19.online
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.indjuvedermdoctorsnearby.todayReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.olf-cart-82894.bond
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.olf-cart-82894.bond/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.olf-cart-82894.bond/b31a/www.hewieandfriends.info
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.olf-cart-82894.bondReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.resdai.xyz
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.resdai.xyz/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.resdai.xyz/b31a/www.hegdg.net
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.resdai.xyzReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rojectleadzone.website
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rojectleadzone.website/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rojectleadzone.website/b31a/www.olf-cart-82894.bond
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.rojectleadzone.websiteReferer:
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.utebolshirts.shop
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.utebolshirts.shop/b31a/
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.utebolshirts.shop/b31a/www.resdai.xyz
          Source: explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.utebolshirts.shopReferer:
          Source: explorer.exe, 00000004.00000002.4516483645.000000000C4DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2062045915.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
          Source: explorer.exe, 00000004.00000003.3827896321.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4506643376.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2056628232.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000004.00000002.4506643376.0000000007637000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2056628232.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000004.00000003.3097162439.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2044254492.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4504765400.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
          Source: explorer.exe, 00000004.00000003.3828353043.0000000009C21000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095363087.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3826265427.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4513465744.0000000009C22000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: explorer.exe, 00000004.00000000.2058647031.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4513550393.0000000009C96000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095363087.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3826265427.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3827270143.0000000009C92000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
          Source: explorer.exe, 00000004.00000002.4516483645.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2062045915.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
          Source: explorer.exe, 00000004.00000003.3094195569.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
          Source: explorer.exe, 00000004.00000003.3094195569.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B2361 GetProcessHeap,HeapAlloc,CreateStreamOnHGlobal,OpenClipboard,GetLastError,EmptyClipboard,GetHGlobalFromStream,SetClipboardData,CloseClipboard,GetProcessHeap,HeapFree,5_2_002B2361
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B2361 GetProcessHeap,HeapAlloc,CreateStreamOnHGlobal,OpenClipboard,GetLastError,EmptyClipboard,GetHGlobalFromStream,SetClipboardData,CloseClipboard,GetProcessHeap,HeapFree,5_2_002B2361

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.4519710590.0000000010520000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d Author: unknown
          Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: DOC_PDF.exe PID: 6620, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: DOC_PDF.exe PID: 5740, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: msdt.exe PID: 4320, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: initial sampleStatic PE information: Filename: DOC_PDF.exe
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041A320 NtCreateFile,3_2_0041A320
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041A3D0 NtReadFile,3_2_0041A3D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041A450 NtClose,3_2_0041A450
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041A500 NtAllocateVirtualMemory,3_2_0041A500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041A44A NtReadFile,NtClose,3_2_0041A44A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902BF0 NtAllocateVirtualMemory,LdrInitializeThunk,3_2_01902BF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902B60 NtClose,LdrInitializeThunk,3_2_01902B60
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902AD0 NtReadFile,LdrInitializeThunk,3_2_01902AD0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902DD0 NtDelayExecution,LdrInitializeThunk,3_2_01902DD0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_01902DF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902D10 NtMapViewOfSection,LdrInitializeThunk,3_2_01902D10
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902D30 NtUnmapViewOfSection,LdrInitializeThunk,3_2_01902D30
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902CA0 NtQueryInformationToken,LdrInitializeThunk,3_2_01902CA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902C70 NtFreeVirtualMemory,LdrInitializeThunk,3_2_01902C70
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902F90 NtProtectVirtualMemory,LdrInitializeThunk,3_2_01902F90
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902FB0 NtResumeThread,LdrInitializeThunk,3_2_01902FB0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902FE0 NtCreateFile,LdrInitializeThunk,3_2_01902FE0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902F30 NtCreateSection,LdrInitializeThunk,3_2_01902F30
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902E80 NtReadVirtualMemory,LdrInitializeThunk,3_2_01902E80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,3_2_01902EA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01904340 NtSetContextThread,3_2_01904340
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01904650 NtSuspendThread,3_2_01904650
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902B80 NtQueryInformationFile,3_2_01902B80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902BA0 NtEnumerateValueKey,3_2_01902BA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902BE0 NtQueryValueKey,3_2_01902BE0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902AB0 NtWaitForSingleObject,3_2_01902AB0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902AF0 NtWriteFile,3_2_01902AF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902DB0 NtEnumerateKey,3_2_01902DB0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902D00 NtSetInformationFile,3_2_01902D00
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902CC0 NtQueryVirtualMemory,3_2_01902CC0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902CF0 NtOpenProcess,3_2_01902CF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902C00 NtQueryInformationProcess,3_2_01902C00
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902C60 NtCreateKey,3_2_01902C60
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902FA0 NtQuerySection,3_2_01902FA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902F60 NtCreateProcessEx,3_2_01902F60
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902EE0 NtQueueApcThread,3_2_01902EE0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902E30 NtWriteVirtualMemory,3_2_01902E30
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01903090 NtSetValueKey,3_2_01903090
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01903010 NtOpenDirectoryObject,3_2_01903010
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019035C0 NtCreateMutant,3_2_019035C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019039B0 NtGetContextThread,3_2_019039B0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01903D10 NtOpenProcessToken,3_2_01903D10
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01903D70 NtOpenThread,3_2_01903D70
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C1C50 NtQueryInformationToken,NtQueryInformationToken,5_2_002C1C50
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C1CBD NtOpenThreadToken,NtOpenProcessToken,NtQueryInformationToken,NtClose,5_2_002C1CBD
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051035C0 NtCreateMutant,LdrInitializeThunk,5_2_051035C0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102D10 NtMapViewOfSection,LdrInitializeThunk,5_2_05102D10
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102DD0 NtDelayExecution,LdrInitializeThunk,5_2_05102DD0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_05102DF0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_05102C70
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102C60 NtCreateKey,LdrInitializeThunk,5_2_05102C60
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102CA0 NtQueryInformationToken,LdrInitializeThunk,5_2_05102CA0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102F30 NtCreateSection,LdrInitializeThunk,5_2_05102F30
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102FE0 NtCreateFile,LdrInitializeThunk,5_2_05102FE0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,5_2_05102EA0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102B60 NtClose,LdrInitializeThunk,5_2_05102B60
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102BF0 NtAllocateVirtualMemory,LdrInitializeThunk,5_2_05102BF0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102BE0 NtQueryValueKey,LdrInitializeThunk,5_2_05102BE0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102AD0 NtReadFile,LdrInitializeThunk,5_2_05102AD0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05104650 NtSuspendThread,5_2_05104650
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05103010 NtOpenDirectoryObject,5_2_05103010
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05103090 NtSetValueKey,5_2_05103090
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05104340 NtSetContextThread,5_2_05104340
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05103D10 NtOpenProcessToken,5_2_05103D10
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102D00 NtSetInformationFile,5_2_05102D00
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102D30 NtUnmapViewOfSection,5_2_05102D30
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05103D70 NtOpenThread,5_2_05103D70
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102DB0 NtEnumerateKey,5_2_05102DB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102C00 NtQueryInformationProcess,5_2_05102C00
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102CC0 NtQueryVirtualMemory,5_2_05102CC0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102CF0 NtOpenProcess,5_2_05102CF0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102F60 NtCreateProcessEx,5_2_05102F60
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102F90 NtProtectVirtualMemory,5_2_05102F90
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102FB0 NtResumeThread,5_2_05102FB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102FA0 NtQuerySection,5_2_05102FA0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102E30 NtWriteVirtualMemory,5_2_05102E30
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102E80 NtReadVirtualMemory,5_2_05102E80
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102EE0 NtQueueApcThread,5_2_05102EE0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051039B0 NtGetContextThread,5_2_051039B0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102B80 NtQueryInformationFile,5_2_05102B80
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102BA0 NtEnumerateValueKey,5_2_05102BA0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102AB0 NtWaitForSingleObject,5_2_05102AB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05102AF0 NtWriteFile,5_2_05102AF0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E8A3D0 NtReadFile,5_2_02E8A3D0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E8A320 NtCreateFile,5_2_02E8A320
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E8A450 NtClose,5_2_02E8A450
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E8A500 NtAllocateVirtualMemory,5_2_02E8A500
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E8A44A NtReadFile,NtClose,5_2_02E8A44A
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DDA036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,5_2_04DDA036
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DD9BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,5_2_04DD9BAF
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DDA042 NtQueryInformationProcess,5_2_04DDA042
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DD9BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,5_2_04DD9BB2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_0173DEEC0_2_0173DEEC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_033B00060_2_033B0006
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_033B00400_2_033B0040
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_083500400_2_08350040
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_08358D680_2_08358D68
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_083500060_2_08350006
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_08354A080_2_08354A08
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_08356A780_2_08356A78
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_083552780_2_08355278
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_08356A670_2_08356A67
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_083552690_2_08355269
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_0835BA880_2_0835BA88
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_083584700_2_08358470
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_08358D580_2_08358D58
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_083545D00_2_083545D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_08354E310_2_08354E31
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004010303_2_00401030
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041D94E3_2_0041D94E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004011743_2_00401174
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004012083_2_00401208
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041EB493_2_0041EB49
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041D5633_2_0041D563
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_00402D903_2_00402D90
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_00409E4B3_2_00409E4B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_00409E503_2_00409E50
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_00402FB03_2_00402FB0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019901AA3_2_019901AA
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019841A23_2_019841A2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019881CC3_2_019881CC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C01003_2_018C0100
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196A1183_2_0196A118
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019581583_2_01958158
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019620003_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE3F03_2_018DE3F0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019903E63_2_019903E6
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198A3523_2_0198A352
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019502C03_2_019502C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019702743_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019905913_2_01990591
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D05353_2_018D0535
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197E4F63_2_0197E4F6
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019744203_2_01974420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019824463_2_01982446
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CC7C03_2_018CC7C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F47503_2_018F4750
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D07703_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EC6E03_2_018EC6E0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A03_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0199A9A63_2_0199A9A6
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E69623_2_018E6962
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B68B83_2_018B68B8
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE8F03_2_018FE8F0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D28403_2_018D2840
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DA8403_2_018DA840
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01986BD73_2_01986BD7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198AB403_2_0198AB40
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA803_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E8DBF3_2_018E8DBF
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CADE03_2_018CADE0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196CD1F3_2_0196CD1F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DAD003_2_018DAD00
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970CB53_2_01970CB5
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C0CF23_2_018C0CF2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0C003_2_018D0C00
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194EFA03_2_0194EFA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C2FC83_2_018C2FC8
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DCFE03_2_018DCFE0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01972F303_2_01972F30
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01912F283_2_01912F28
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F0F303_2_018F0F30
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01944F403_2_01944F40
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198CE933_2_0198CE93
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E2E903_2_018E2E90
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198EEDB3_2_0198EEDB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198EE263_2_0198EE26
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0E593_2_018D0E59
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DB1B03_2_018DB1B0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0199B16B3_2_0199B16B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BF1723_2_018BF172
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0190516C3_2_0190516C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D70C03_2_018D70C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197F0CC3_2_0197F0CC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019870E93_2_019870E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198F0E03_2_0198F0E0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0191739A3_2_0191739A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198132D3_2_0198132D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BD34C3_2_018BD34C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D52A03_2_018D52A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EB2C03_2_018EB2C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019712ED3_2_019712ED
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196D5B03_2_0196D5B0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019995C33_2_019995C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019875713_2_01987571
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198F43F3_2_0198F43F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C14603_2_018C1460
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198F7B03_2_0198F7B0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019816CC3_2_019816CC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019156303_2_01915630
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019659103_2_01965910
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D99503_2_018D9950
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EB9503_2_018EB950
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D38E03_2_018D38E0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193D8003_2_0193D800
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EFB803_2_018EFB80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01945BF03_2_01945BF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0190DBF93_2_0190DBF9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198FB763_2_0198FB76
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01915AA03_2_01915AA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01971AA33_2_01971AA3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196DAAC3_2_0196DAAC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197DAC63_2_0197DAC6
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198FA493_2_0198FA49
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01987A463_2_01987A46
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01943A6C3_2_01943A6C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EFDC03_2_018EFDC0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01981D5A3_2_01981D5A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D3D403_2_018D3D40
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01987D733_2_01987D73
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198FCF23_2_0198FCF2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01949C323_2_01949C32
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D1F923_2_018D1F92
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198FFB13_2_0198FFB1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01893FD23_2_01893FD2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01893FD53_2_01893FD5
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198FF093_2_0198FF09
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D9EB03_2_018D9EB0
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF7C2324_2_0EF7C232
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF76B324_2_0EF76B32
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF76B304_2_0EF76B30
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF720824_2_0EF72082
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF7B0364_2_0EF7B036
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF7F5CD4_2_0EF7F5CD
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF799124_2_0EF79912
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF73D024_2_0EF73D02
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002CC8035_2_002CC803
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002AF0DB5_2_002AF0DB
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002A59505_2_002A5950
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002BFCE75_2_002BFCE7
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B47025_2_002B4702
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C2FD35_2_002C2FD3
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D05355_2_050D0535
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051875715_2_05187571
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051905915_2_05190591
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0516D5B05_2_0516D5B0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518F43F5_2_0518F43F
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051824465_2_05182446
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050C14605_2_050C1460
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0517E4F65_2_0517E4F6
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050F47505_2_050F4750
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D07705_2_050D0770
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518F7B05_2_0518F7B0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050CC7C05_2_050CC7C0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051816CC5_2_051816CC
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050EC6E05_2_050EC6E0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050C01005_2_050C0100
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0516A1185_2_0516A118
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051581585_2_05158158
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0519B16B5_2_0519B16B
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050BF1725_2_050BF172
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0510516C5_2_0510516C
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051901AA5_2_051901AA
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050DB1B05_2_050DB1B0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051881CC5_2_051881CC
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D70C05_2_050D70C0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0517F0CC5_2_0517F0CC
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051870E95_2_051870E9
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518F0E05_2_0518F0E0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518132D5_2_0518132D
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050BD34C5_2_050BD34C
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518A3525_2_0518A352
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0511739A5_2_0511739A
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050DE3F05_2_050DE3F0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051903E65_2_051903E6
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051702745_2_05170274
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D52A05_2_050D52A0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050EB2C05_2_050EB2C0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051502C05_2_051502C0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_051712ED5_2_051712ED
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050DAD005_2_050DAD00
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05181D5A5_2_05181D5A
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D3D405_2_050D3D40
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05187D735_2_05187D73
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050E8DBF5_2_050E8DBF
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050EFDC05_2_050EFDC0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050CADE05_2_050CADE0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D0C005_2_050D0C00
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05149C325_2_05149C32
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05170CB55_2_05170CB5
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518FCF25_2_0518FCF2
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050C0CF25_2_050C0CF2
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518FF095_2_0518FF09
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05112F285_2_05112F28
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050F0F305_2_050F0F30
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05144F405_2_05144F40
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D1F925_2_050D1F92
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518FFB15_2_0518FFB1
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0514EFA05_2_0514EFA0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050C2FC85_2_050C2FC8
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05093FD25_2_05093FD2
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05093FD55_2_05093FD5
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050DCFE05_2_050DCFE0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518EE265_2_0518EE26
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D0E595_2_050D0E59
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518CE935_2_0518CE93
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050E2E905_2_050E2E90
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D9EB05_2_050D9EB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518EEDB5_2_0518EEDB
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D99505_2_050D9950
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050EB9505_2_050EB950
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050E69625_2_050E6962
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D29A05_2_050D29A0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0519A9A65_2_0519A9A6
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0513D8005_2_0513D800
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D28405_2_050D2840
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050DA8405_2_050DA840
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050B68B85_2_050B68B8
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050D38E05_2_050D38E0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050FE8F05_2_050FE8F0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518AB405_2_0518AB40
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518FB765_2_0518FB76
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050EFB805_2_050EFB80
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05186BD75_2_05186BD7
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05145BF05_2_05145BF0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0510DBF95_2_0510DBF9
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0518FA495_2_0518FA49
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05187A465_2_05187A46
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05143A6C5_2_05143A6C
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_050CEA805_2_050CEA80
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_05115AA05_2_05115AA0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0516DAAC5_2_0516DAAC
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_0517DAC65_2_0517DAC6
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E8EB495_2_02E8EB49
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E79E4B5_2_02E79E4B
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E79E505_2_02E79E50
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E72FB05_2_02E72FB0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_02E72D905_2_02E72D90
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DDA0365_2_04DDA036
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DDE5CD5_2_04DDE5CD
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DD2D025_2_04DD2D02
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DD10825_2_04DD1082
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DD89125_2_04DD8912
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DDB2325_2_04DDB232
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DD5B305_2_04DD5B30
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_04DD5B325_2_04DD5B32
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 002CE523 appears 31 times
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 05117E54 appears 96 times
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 002919DB appears 34 times
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 05105130 appears 36 times
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 050BB970 appears 272 times
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 0513EA12 appears 86 times
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 002999E8 appears 891 times
          Source: C:\Windows\SysWOW64\msdt.exeCode function: String function: 0514F290 appears 105 times
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: String function: 018BB970 appears 280 times
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: String function: 0194F290 appears 105 times
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: String function: 01917E54 appears 111 times
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: String function: 0193EA12 appears 86 times
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: String function: 01905130 appears 58 times
          Source: DOC_PDF.exe, 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DOC_PDF.exe
          Source: DOC_PDF.exe, 00000000.00000000.2031155338.0000000000F68000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemJGu.exe> vs DOC_PDF.exe
          Source: DOC_PDF.exe, 00000000.00000002.2065517443.00000000082B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs DOC_PDF.exe
          Source: DOC_PDF.exe, 00000003.00000002.2104291686.0000000001D30000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemsdt.exej% vs DOC_PDF.exe
          Source: DOC_PDF.exe, 00000003.00000002.2102921676.00000000019BD000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DOC_PDF.exe
          Source: DOC_PDF.exeBinary or memory string: OriginalFilenamemJGu.exe> vs DOC_PDF.exe
          Source: DOC_PDF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.4519710590.0000000010520000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18
          Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: DOC_PDF.exe PID: 6620, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: DOC_PDF.exe PID: 5740, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: msdt.exe PID: 4320, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: DOC_PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, qvUpK54jLa4D0hOo8U.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, qvUpK54jLa4D0hOo8U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, qvUpK54jLa4D0hOo8U.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, qvUpK54jLa4D0hOo8U.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, qvUpK54jLa4D0hOo8U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, qvUpK54jLa4D0hOo8U.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, kaGBmd7IL3A7gie4gL.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, kaGBmd7IL3A7gie4gL.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/1@11/0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C2826 VariantInit,CoCreateInstance,SysFreeString,SysStringLen,GetProcessHeap,HeapAlloc,WideCharToMultiByte,GetLastError,VariantClear,CreateStreamOnHGlobal,VariantClear,GetProcessHeap,HeapFree,SysFreeString,5_2_002C2826
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C1DB3 FindResourceW,GetLastError,LoadResource,GetLastError,LockResource,SizeofResource,GetLastError,GlobalAlloc,GetLastError,GlobalLock,GetLastError,memcpy,CreateStreamOnHGlobal,FreeResource,GlobalUnlock,GlobalFree,5_2_002C1DB3
          Source: C:\Users\user\Desktop\DOC_PDF.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DOC_PDF.exe.logJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeMutant created: NULL
          Source: C:\Users\user\Desktop\DOC_PDF.exeMutant created: \Sessions\1\BaseNamedObjects\quRFdtlEfmViPotvOfS
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7088:120:WilError_03
          Source: DOC_PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: DOC_PDF.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: DOC_PDF.exeReversingLabs: Detection: 58%
          Source: unknownProcess created: C:\Users\user\Desktop\DOC_PDF.exe "C:\Users\user\Desktop\DOC_PDF.exe"
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess created: C:\Users\user\Desktop\DOC_PDF.exe "C:\Users\user\Desktop\DOC_PDF.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\msdt.exe "C:\Windows\SysWOW64\msdt.exe"
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DOC_PDF.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess created: C:\Users\user\Desktop\DOC_PDF.exe "C:\Users\user\Desktop\DOC_PDF.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\msdt.exe "C:\Windows\SysWOW64\msdt.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DOC_PDF.exe"Jump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: DOC_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: DOC_PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: DOC_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: msdt.pdbGCTL source: DOC_PDF.exe, 00000003.00000002.2104291686.0000000001D30000.00000040.10000000.00040000.00000000.sdmp, msdt.exe, 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: DOC_PDF.exe, 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000003.2106101852.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000003.2102931452.0000000004D30000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: DOC_PDF.exe, DOC_PDF.exe, 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, msdt.exe, 00000005.00000003.2106101852.0000000004EE5000.00000004.00000020.00020000.00000000.sdmp, msdt.exe, 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmp, msdt.exe, 00000005.00000003.2102931452.0000000004D30000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mJGu.pdb source: DOC_PDF.exe
          Source: Binary string: mJGu.pdbSHA256 source: DOC_PDF.exe
          Source: Binary string: msdt.pdb source: DOC_PDF.exe, 00000003.00000002.2104291686.0000000001D30000.00000040.10000000.00040000.00000000.sdmp, msdt.exe, msdt.exe, 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: DOC_PDF.exe, MainForm.cs.Net Code: InitializeComponent
          Source: 0.2.DOC_PDF.exe.34698e4.0.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, qvUpK54jLa4D0hOo8U.cs.Net Code: nOS8QND6g2 System.Reflection.Assembly.Load(byte[])
          Source: 0.2.DOC_PDF.exe.76b0000.3.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, qvUpK54jLa4D0hOo8U.cs.Net Code: nOS8QND6g2 System.Reflection.Assembly.Load(byte[])
          Source: 0.2.DOC_PDF.exe.345c734.1.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
          Source: 4.2.explorer.exe.10aff840.0.raw.unpack, MainForm.cs.Net Code: InitializeComponent
          Source: 5.2.msdt.exe.55df840.3.raw.unpack, MainForm.cs.Net Code: InitializeComponent
          Source: DOC_PDF.exeStatic PE information: 0xCCFF9492 [Mon Dec 26 17:36:18 2078 UTC]
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 0_2_033BEB08 pushfd ; iretd 0_2_033BEB09
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041E03F push F69B27B4h; ret 3_2_0041E044
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004169E1 push cs; ret 3_2_00416A1B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_00416996 push cs; ret 3_2_00416A1B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004179BE push esp; ret 3_2_004179C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041645D push 22047084h; ret 3_2_00416462
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041D475 push eax; ret 3_2_0041D4C8
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041D4C2 push eax; ret 3_2_0041D4C8
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041D4CB push eax; ret 3_2_0041D532
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041D52C push eax; ret 3_2_0041D532
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004035C8 push esi; iretd 3_2_004035CF
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004175A0 pushfd ; iretd 3_2_004175B5
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0041DE4A push ebp; iretd 3_2_0041DE52
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004176EF push cs; ret 3_2_004176D4
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_004176A1 push cs; ret 3_2_004176D4
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0189225F pushad ; ret 3_2_018927F9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018927FA pushad ; ret 3_2_018927F9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C09AD push ecx; mov dword ptr [esp], ecx3_2_018C09B6
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0189283D push eax; iretd 3_2_01892858
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01891200 push eax; iretd 3_2_01891369
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF7FB1E push esp; retn 0000h4_2_0EF7FB1F
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF7FB02 push esp; retn 0000h4_2_0EF7FB03
          Source: C:\Windows\explorer.exeCode function: 4_2_0EF7F9B5 push esp; retn 0000h4_2_0EF7FAE7
          Source: C:\Windows\explorer.exeCode function: 4_2_10403873 push eax; ret 4_2_10403874
          Source: C:\Windows\explorer.exeCode function: 4_2_10401E74 push ecx; iretd 4_2_10401E76
          Source: C:\Windows\explorer.exeCode function: 4_2_10401C10 push edi; ret 4_2_10401C2B
          Source: C:\Windows\explorer.exeCode function: 4_2_1040322C push edi; retf 4_2_104032AF
          Source: C:\Windows\explorer.exeCode function: 4_2_10403288 push edi; retf 4_2_104032AF
          Source: C:\Windows\explorer.exeCode function: 4_2_10402E94 push ebx; iretd 4_2_10402F30
          Source: C:\Windows\explorer.exeCode function: 4_2_10403346 push esi; retf 4_2_1040334F
          Source: C:\Windows\explorer.exeCode function: 4_2_10401D48 push 90F076E7h; ret 4_2_10401D4D
          Source: DOC_PDF.exeStatic PE information: section name: .text entropy: 7.806630339806879
          Source: 0.2.DOC_PDF.exe.34698e4.0.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
          Source: 0.2.DOC_PDF.exe.34698e4.0.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, kaGBmd7IL3A7gie4gL.csHigh entropy of concatenated method names: 'TshlAjPJZL', 'j76lE2RSAa', 'eIMl1XYK80', 'Fd4lNyhLyG', 'wAUlmG9fX2', 'pPElj6AcSC', 'Y5Ylw0Wtyu', 'uKjlYEWN24', 'kLFlJWw8t9', 'ATXlaECreM'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, qvUpK54jLa4D0hOo8U.csHigh entropy of concatenated method names: 'e3vBXHLhG2', 'w0cBHQfGWy', 'TpjBlvWHH9', 'AjgBRVEYuF', 'VuOBclPojZ', 'ytDBCXcePX', 'nrhBO8Ks68', 'nA2B4wDg8Y', 'lyOBho3X1n', 'VFaBfUIfsD'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, ja0FrxTKZaBXr6wtsN.csHigh entropy of concatenated method names: 'CatOH9nCgp', 'dPROR5TW6W', 'u2COCEFQNH', 'QqoCamf6I8', 'm5oCzA6a2K', 'yHyOkajt58', 'Lj3OqQ1lJv', 'Ik0O6YEeGi', 'YxVOBOg1Yo', 'JCkO8mIlEL'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, QCtMcHNdkjLmfehFJJ.csHigh entropy of concatenated method names: 'LxUiftudFk', 'Uwui5STqaE', 'ToString', 'wSHiHHxApx', 'JZvil9Lr4K', 'pcMiR3CtIY', 'nDxic5fSo2', 'fIZiCSEmQD', 'wjEiOH2ZwF', 'rydi4W70NF'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, MITUhauvnfmoykYTqq.csHigh entropy of concatenated method names: 'hWnO9tR90Z', 'RPlOg7Voll', 'J9jOQPsWsn', 'T23OtqHiVh', 'zIuOdy1osa', 'phdOvddFVE', 'P8FO0nHDu7', 'bEcO7i7q7G', 'LLVOMUN1jj', 'aQBOGBVTyC'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, jbhZerAV999bCjLvh3.csHigh entropy of concatenated method names: 'w3RnSxZMX5', 'T9inUwcilY', 'g1nnAXwSyP', 'i6QnEAtd6e', 'pyXnWEaM6S', 'YMGnK9711T', 'PD7nD4vgHd', 'UCinVGNKMe', 'fWonrTE6P6', 'GrgnTaXEJA'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, nDVKwsqkqtbqtimbRvH.csHigh entropy of concatenated method names: 'sSfs9dymTW', 'vCnsgwsXcC', 'v8qsQ1k50b', 'C5VstNy2Yv', 'WAosd4ZixB', 'fi6svf6QLU', 'Ccts0tH9qd', 'q2Vs7LHjt7', 'UtosMyQu2T', 'R9RsGDG15n'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, mi2vS06JFYcge8cJoT.csHigh entropy of concatenated method names: 'ijyQtGxoP', 'uSYtDj0yv', 'MSLvDqLnx', 'D5s0GKYi3', 'XOGMWJnxB', 'yyuGEf5Mo', 'SyCbsdWr4WpbHsjmj1', 'zfUAZl5hcdC1RcJBJV', 'UuXPhQTpr', 'wytbM9heC'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, HAFWCwl0wYV1TKc6JB.csHigh entropy of concatenated method names: 'Dispose', 'Ps5qJehSOS', 'T4V6WWT0UJ', 'Ilpggpho9I', 'VSSqabGYCi', 'LNJqzvf3qI', 'ProcessDialogKey', 'UYs6kYnkvU', 'rWf6qBSvcp', 'SeR66Xsw2P'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, kRiFjiqqm6lUi7TpIZ9.csHigh entropy of concatenated method names: 'ToString', 'eMIbBhtbg0', 'idjb8DwYql', 'zAybXfgVfo', 'ge8bHQPAwJ', 'IngblQd15S', 'Q6gbRNcssi', 'EyTbck6T4h', 'l40YXvAO2OtCux7W14Z', 'xDiS9TA1nnTpNBLwbct'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, Sq34kgFFB7d6NqHHEk.csHigh entropy of concatenated method names: 'Mixp7T4cIq', 'L8rpM1upqb', 'QTIpZebKrr', 'zsCpWOKuJd', 'KSNpDCEHAo', 'BQcpVw1bSP', 'scUpT7cJrx', 'wZBpxRubdw', 'vn4pSEjnsi', 'ND1pyb9UbZ'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, NSbGYCYiTNJvf3qImY.csHigh entropy of concatenated method names: 'khwPHJhNnf', 'QxWPlNFEAX', 'SjRPRxjb29', 'aitPcykvf3', 'pyCPCsZfUD', 'ekdPO14mIS', 'OJiP4iMxIm', 'HdSPhkGV1Q', 'abmPffKnHW', 'f47P5mgPgG'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, uvx5IhqBbtBJdXBT7hK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Bl4bAUGNvl', 'S3HbE2Js6j', 'G1Xb1PFgEf', 'ARBbNh4dxo', 'JZibmRtShS', 'N0hbjCneJn', 'SM5bwaJ18E'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, FeJObWZn6B0YmoJaZH.csHigh entropy of concatenated method names: 'xmOCXGf5FG', 'UgWClyfWkp', 'BHwCc6lkFI', 'jf3CORu9QE', 'nfxC41hJ71', 'a0Jcmkgssr', 'dZFcjBbHTM', 'DxEcw0OJY5', 'NPMcYgFQoR', 'TumcJnyDaE'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, XSjCJsG9WsDXjdgYs9.csHigh entropy of concatenated method names: 'NwGcdX8s03', 'Jtlc033kFB', 'h7vRKKN01u', 'c0FRDS2AAw', 'DTERVSwtNq', 'zVURrDe8DM', 'yToRTPCb7p', 'RpGRxA1t6j', 'fUpRuXm3Lt', 't8ORSMxOMH'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, GmQJ8Dq67Fj8S6cvP8x.csHigh entropy of concatenated method names: 'I60b9FPtXc', 'Lf6bgiy0Mq', 'UZvbQ0C6q6', 'u5fJj2AtbFwQBGJcXeC', 'JHO1soAaucEYu1v7Od4', 'LJGpQiAHXo2TuJeCodh', 'rVSQtuACZ08U3j52EMQ', 'Dl6kigA0lYk3q3ZOJ6l'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, LS0I0oM0IRdNrt8PB6.csHigh entropy of concatenated method names: 'IbZRtHId8b', 'q1IRvMDyWH', 'sCrR7GLJar', 'gRsRM8rv8w', 'EBGRnSVkWY', 'I77ReeVg1e', 'M3ORiJ5a1l', 'pgTRPlvF1i', 'XSIRs0W2TK', 'pQERbhS9cW'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, rYnkvUJPWfBSvcpEeR.csHigh entropy of concatenated method names: 'YxiPZERhUi', 'PuQPW0TP22', 'N3lPKAZtn4', 'miVPD8dRdO', 'JpRPAVBAbh', 'WlNPVXib1h', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.DOC_PDF.exe.461af80.2.raw.unpack, xw56Ae8FFfYwaKqXtX.csHigh entropy of concatenated method names: 'Vv4qOaGBmd', 'wL3q4A7gie', 'v0IqfRdNrt', 'ePBq56YSjC', 'AgYqns9GeJ', 'jbWqen6B0Y', 'v4idR4zXiNZshdJNAB', 'vpBqOeKNk5ZbQgDOPW8', 'QdGqqvYUmS', 'BpiqB03wkB'
          Source: 0.2.DOC_PDF.exe.76b0000.3.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
          Source: 0.2.DOC_PDF.exe.76b0000.3.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, kaGBmd7IL3A7gie4gL.csHigh entropy of concatenated method names: 'TshlAjPJZL', 'j76lE2RSAa', 'eIMl1XYK80', 'Fd4lNyhLyG', 'wAUlmG9fX2', 'pPElj6AcSC', 'Y5Ylw0Wtyu', 'uKjlYEWN24', 'kLFlJWw8t9', 'ATXlaECreM'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, qvUpK54jLa4D0hOo8U.csHigh entropy of concatenated method names: 'e3vBXHLhG2', 'w0cBHQfGWy', 'TpjBlvWHH9', 'AjgBRVEYuF', 'VuOBclPojZ', 'ytDBCXcePX', 'nrhBO8Ks68', 'nA2B4wDg8Y', 'lyOBho3X1n', 'VFaBfUIfsD'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, ja0FrxTKZaBXr6wtsN.csHigh entropy of concatenated method names: 'CatOH9nCgp', 'dPROR5TW6W', 'u2COCEFQNH', 'QqoCamf6I8', 'm5oCzA6a2K', 'yHyOkajt58', 'Lj3OqQ1lJv', 'Ik0O6YEeGi', 'YxVOBOg1Yo', 'JCkO8mIlEL'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, QCtMcHNdkjLmfehFJJ.csHigh entropy of concatenated method names: 'LxUiftudFk', 'Uwui5STqaE', 'ToString', 'wSHiHHxApx', 'JZvil9Lr4K', 'pcMiR3CtIY', 'nDxic5fSo2', 'fIZiCSEmQD', 'wjEiOH2ZwF', 'rydi4W70NF'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, MITUhauvnfmoykYTqq.csHigh entropy of concatenated method names: 'hWnO9tR90Z', 'RPlOg7Voll', 'J9jOQPsWsn', 'T23OtqHiVh', 'zIuOdy1osa', 'phdOvddFVE', 'P8FO0nHDu7', 'bEcO7i7q7G', 'LLVOMUN1jj', 'aQBOGBVTyC'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, jbhZerAV999bCjLvh3.csHigh entropy of concatenated method names: 'w3RnSxZMX5', 'T9inUwcilY', 'g1nnAXwSyP', 'i6QnEAtd6e', 'pyXnWEaM6S', 'YMGnK9711T', 'PD7nD4vgHd', 'UCinVGNKMe', 'fWonrTE6P6', 'GrgnTaXEJA'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, nDVKwsqkqtbqtimbRvH.csHigh entropy of concatenated method names: 'sSfs9dymTW', 'vCnsgwsXcC', 'v8qsQ1k50b', 'C5VstNy2Yv', 'WAosd4ZixB', 'fi6svf6QLU', 'Ccts0tH9qd', 'q2Vs7LHjt7', 'UtosMyQu2T', 'R9RsGDG15n'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, mi2vS06JFYcge8cJoT.csHigh entropy of concatenated method names: 'ijyQtGxoP', 'uSYtDj0yv', 'MSLvDqLnx', 'D5s0GKYi3', 'XOGMWJnxB', 'yyuGEf5Mo', 'SyCbsdWr4WpbHsjmj1', 'zfUAZl5hcdC1RcJBJV', 'UuXPhQTpr', 'wytbM9heC'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, HAFWCwl0wYV1TKc6JB.csHigh entropy of concatenated method names: 'Dispose', 'Ps5qJehSOS', 'T4V6WWT0UJ', 'Ilpggpho9I', 'VSSqabGYCi', 'LNJqzvf3qI', 'ProcessDialogKey', 'UYs6kYnkvU', 'rWf6qBSvcp', 'SeR66Xsw2P'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, kRiFjiqqm6lUi7TpIZ9.csHigh entropy of concatenated method names: 'ToString', 'eMIbBhtbg0', 'idjb8DwYql', 'zAybXfgVfo', 'ge8bHQPAwJ', 'IngblQd15S', 'Q6gbRNcssi', 'EyTbck6T4h', 'l40YXvAO2OtCux7W14Z', 'xDiS9TA1nnTpNBLwbct'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, Sq34kgFFB7d6NqHHEk.csHigh entropy of concatenated method names: 'Mixp7T4cIq', 'L8rpM1upqb', 'QTIpZebKrr', 'zsCpWOKuJd', 'KSNpDCEHAo', 'BQcpVw1bSP', 'scUpT7cJrx', 'wZBpxRubdw', 'vn4pSEjnsi', 'ND1pyb9UbZ'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, NSbGYCYiTNJvf3qImY.csHigh entropy of concatenated method names: 'khwPHJhNnf', 'QxWPlNFEAX', 'SjRPRxjb29', 'aitPcykvf3', 'pyCPCsZfUD', 'ekdPO14mIS', 'OJiP4iMxIm', 'HdSPhkGV1Q', 'abmPffKnHW', 'f47P5mgPgG'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, uvx5IhqBbtBJdXBT7hK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Bl4bAUGNvl', 'S3HbE2Js6j', 'G1Xb1PFgEf', 'ARBbNh4dxo', 'JZibmRtShS', 'N0hbjCneJn', 'SM5bwaJ18E'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, FeJObWZn6B0YmoJaZH.csHigh entropy of concatenated method names: 'xmOCXGf5FG', 'UgWClyfWkp', 'BHwCc6lkFI', 'jf3CORu9QE', 'nfxC41hJ71', 'a0Jcmkgssr', 'dZFcjBbHTM', 'DxEcw0OJY5', 'NPMcYgFQoR', 'TumcJnyDaE'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, XSjCJsG9WsDXjdgYs9.csHigh entropy of concatenated method names: 'NwGcdX8s03', 'Jtlc033kFB', 'h7vRKKN01u', 'c0FRDS2AAw', 'DTERVSwtNq', 'zVURrDe8DM', 'yToRTPCb7p', 'RpGRxA1t6j', 'fUpRuXm3Lt', 't8ORSMxOMH'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, GmQJ8Dq67Fj8S6cvP8x.csHigh entropy of concatenated method names: 'I60b9FPtXc', 'Lf6bgiy0Mq', 'UZvbQ0C6q6', 'u5fJj2AtbFwQBGJcXeC', 'JHO1soAaucEYu1v7Od4', 'LJGpQiAHXo2TuJeCodh', 'rVSQtuACZ08U3j52EMQ', 'Dl6kigA0lYk3q3ZOJ6l'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, LS0I0oM0IRdNrt8PB6.csHigh entropy of concatenated method names: 'IbZRtHId8b', 'q1IRvMDyWH', 'sCrR7GLJar', 'gRsRM8rv8w', 'EBGRnSVkWY', 'I77ReeVg1e', 'M3ORiJ5a1l', 'pgTRPlvF1i', 'XSIRs0W2TK', 'pQERbhS9cW'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, rYnkvUJPWfBSvcpEeR.csHigh entropy of concatenated method names: 'YxiPZERhUi', 'PuQPW0TP22', 'N3lPKAZtn4', 'miVPD8dRdO', 'JpRPAVBAbh', 'WlNPVXib1h', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.DOC_PDF.exe.82b0000.4.raw.unpack, xw56Ae8FFfYwaKqXtX.csHigh entropy of concatenated method names: 'Vv4qOaGBmd', 'wL3q4A7gie', 'v0IqfRdNrt', 'ePBq56YSjC', 'AgYqns9GeJ', 'jbWqen6B0Y', 'v4idR4zXiNZshdJNAB', 'vpBqOeKNk5ZbQgDOPW8', 'QdGqqvYUmS', 'BpiqB03wkB'
          Source: 0.2.DOC_PDF.exe.345c734.1.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
          Source: 0.2.DOC_PDF.exe.345c734.1.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x87 0x7E 0xE1
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: DOC_PDF.exe PID: 6620, type: MEMORYSTR
          Source: C:\Users\user\Desktop\DOC_PDF.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
          Source: C:\Users\user\Desktop\DOC_PDF.exeAPI/Special instruction interceptor: Address: 7FF8C88F0774
          Source: C:\Users\user\Desktop\DOC_PDF.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
          Source: C:\Users\user\Desktop\DOC_PDF.exeAPI/Special instruction interceptor: Address: 7FF8C88ED8A4
          Source: C:\Users\user\Desktop\DOC_PDF.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
          Source: C:\Users\user\Desktop\DOC_PDF.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
          Source: C:\Users\user\Desktop\DOC_PDF.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DOC_PDF.exeRDTSC instruction interceptor: First address: 409B6E second address: 409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 2E79904 second address: 2E7990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\msdt.exeRDTSC instruction interceptor: First address: 2E79B6E second address: 2E79B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory allocated: 16C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory allocated: 33D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory allocated: 3240000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory allocated: 84A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory allocated: 94A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory allocated: 9660000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory allocated: A660000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_00409AA0 rdtsc 3_2_00409AA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 9850Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 891Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 861Jump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeWindow / User API: threadDelayed 5375Jump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeWindow / User API: threadDelayed 4596Jump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeAPI coverage: 1.6 %
          Source: C:\Windows\SysWOW64\msdt.exeAPI coverage: 0.8 %
          Source: C:\Users\user\Desktop\DOC_PDF.exe TID: 6256Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 6180Thread sleep count: 9850 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 6180Thread sleep time: -19700000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 6180Thread sleep count: 96 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 6180Thread sleep time: -192000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\msdt.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\msdt.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B602D GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,SetFileAttributesW,GetLastError,DeleteFileW,GetLastError,FindNextFileW,FindClose,RemoveDirectoryW,GetLastError,GetProcessHeap,HeapFree,5_2_002B602D
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C60A8 memset,GetProcessHeap,HeapAlloc,FindFirstFileW,GetProcessHeap,HeapAlloc,GetLastError,FindClose,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_002C60A8
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B1B92 memset,GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,5_2_002B1B92
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B5C20 memset,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,CloseHandle,FindFirstFileW,_wcsicmp,_wcsicmp,GetFileAttributesW,SetFileAttributesW,GetLastError,GetFileAttributesW,SetFileAttributesW,GetLastError,DeleteFileW,CreateFileW,GetLastError,CloseHandle,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,CloseHandle,CloseHandle,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_002B5C20
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002C743A memset,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,CopyFileW,GetLastError,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_002C743A
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B4CB6 memset,GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,5_2_002B4CB6
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B4EDC memset,GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,FindNextFileW,FindClose,GetLastError,GetProcessHeap,HeapFree,5_2_002B4EDC
          Source: C:\Users\user\Desktop\DOC_PDF.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 00000004.00000003.3827270143.0000000009C92000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
          Source: explorer.exe, 00000004.00000000.2056628232.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
          Source: explorer.exe, 00000004.00000002.4513465744.0000000009C22000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
          Source: explorer.exe, 00000004.00000003.3827270143.0000000009C92000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000003.3097162439.000000000354D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
          Source: explorer.exe, 00000004.00000003.3827270143.0000000009C92000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000004.00000002.4502583953.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
          Source: explorer.exe, 00000004.00000003.3097162439.000000000354D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
          Source: explorer.exe, 00000004.00000000.2056628232.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
          Source: explorer.exe, 00000004.00000000.2058647031.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.0000000009B2C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000004.00000003.3097162439.000000000354D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
          Source: explorer.exe, 00000004.00000003.3097162439.000000000354D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
          Source: explorer.exe, 00000004.00000002.4513465744.0000000009C22000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
          Source: explorer.exe, 00000004.00000003.3827270143.0000000009C92000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
          Source: explorer.exe, 00000004.00000002.4502583953.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000004.00000002.4510666183.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000002.4506643376.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_00409AA0 rdtsc 3_2_00409AA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0040ACE0 LdrLoadDll,3_2_0040ACE0
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002A0FA2 GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,5_2_002A0FA2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194019F mov eax, dword ptr fs:[00000030h]3_2_0194019F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194019F mov eax, dword ptr fs:[00000030h]3_2_0194019F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194019F mov eax, dword ptr fs:[00000030h]3_2_0194019F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194019F mov eax, dword ptr fs:[00000030h]3_2_0194019F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01900185 mov eax, dword ptr fs:[00000030h]3_2_01900185
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01964180 mov eax, dword ptr fs:[00000030h]3_2_01964180
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01964180 mov eax, dword ptr fs:[00000030h]3_2_01964180
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BA197 mov eax, dword ptr fs:[00000030h]3_2_018BA197
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BA197 mov eax, dword ptr fs:[00000030h]3_2_018BA197
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BA197 mov eax, dword ptr fs:[00000030h]3_2_018BA197
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197C188 mov eax, dword ptr fs:[00000030h]3_2_0197C188
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197C188 mov eax, dword ptr fs:[00000030h]3_2_0197C188
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E1D0 mov eax, dword ptr fs:[00000030h]3_2_0193E1D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E1D0 mov eax, dword ptr fs:[00000030h]3_2_0193E1D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E1D0 mov ecx, dword ptr fs:[00000030h]3_2_0193E1D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E1D0 mov eax, dword ptr fs:[00000030h]3_2_0193E1D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E1D0 mov eax, dword ptr fs:[00000030h]3_2_0193E1D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019861C3 mov eax, dword ptr fs:[00000030h]3_2_019861C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019861C3 mov eax, dword ptr fs:[00000030h]3_2_019861C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F01F8 mov eax, dword ptr fs:[00000030h]3_2_018F01F8
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019961E5 mov eax, dword ptr fs:[00000030h]3_2_019961E5
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01980115 mov eax, dword ptr fs:[00000030h]3_2_01980115
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196A118 mov ecx, dword ptr fs:[00000030h]3_2_0196A118
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196A118 mov eax, dword ptr fs:[00000030h]3_2_0196A118
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196A118 mov eax, dword ptr fs:[00000030h]3_2_0196A118
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196A118 mov eax, dword ptr fs:[00000030h]3_2_0196A118
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov eax, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov ecx, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov eax, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov eax, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov ecx, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov eax, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov eax, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov ecx, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov eax, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E10E mov ecx, dword ptr fs:[00000030h]3_2_0196E10E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F0124 mov eax, dword ptr fs:[00000030h]3_2_018F0124
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01958158 mov eax, dword ptr fs:[00000030h]3_2_01958158
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01954144 mov eax, dword ptr fs:[00000030h]3_2_01954144
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01954144 mov eax, dword ptr fs:[00000030h]3_2_01954144
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01954144 mov ecx, dword ptr fs:[00000030h]3_2_01954144
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01954144 mov eax, dword ptr fs:[00000030h]3_2_01954144
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01954144 mov eax, dword ptr fs:[00000030h]3_2_01954144
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C6154 mov eax, dword ptr fs:[00000030h]3_2_018C6154
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C6154 mov eax, dword ptr fs:[00000030h]3_2_018C6154
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BC156 mov eax, dword ptr fs:[00000030h]3_2_018BC156
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994164 mov eax, dword ptr fs:[00000030h]3_2_01994164
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994164 mov eax, dword ptr fs:[00000030h]3_2_01994164
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C208A mov eax, dword ptr fs:[00000030h]3_2_018C208A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019860B8 mov eax, dword ptr fs:[00000030h]3_2_019860B8
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019860B8 mov ecx, dword ptr fs:[00000030h]3_2_019860B8
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B80A0 mov eax, dword ptr fs:[00000030h]3_2_018B80A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019580A8 mov eax, dword ptr fs:[00000030h]3_2_019580A8
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019420DE mov eax, dword ptr fs:[00000030h]3_2_019420DE
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019020F0 mov ecx, dword ptr fs:[00000030h]3_2_019020F0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C80E9 mov eax, dword ptr fs:[00000030h]3_2_018C80E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BA0E3 mov ecx, dword ptr fs:[00000030h]3_2_018BA0E3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019460E0 mov eax, dword ptr fs:[00000030h]3_2_019460E0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BC0F0 mov eax, dword ptr fs:[00000030h]3_2_018BC0F0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01944000 mov ecx, dword ptr fs:[00000030h]3_2_01944000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01962000 mov eax, dword ptr fs:[00000030h]3_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01962000 mov eax, dword ptr fs:[00000030h]3_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01962000 mov eax, dword ptr fs:[00000030h]3_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01962000 mov eax, dword ptr fs:[00000030h]3_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01962000 mov eax, dword ptr fs:[00000030h]3_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01962000 mov eax, dword ptr fs:[00000030h]3_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01962000 mov eax, dword ptr fs:[00000030h]3_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01962000 mov eax, dword ptr fs:[00000030h]3_2_01962000
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE016 mov eax, dword ptr fs:[00000030h]3_2_018DE016
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE016 mov eax, dword ptr fs:[00000030h]3_2_018DE016
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE016 mov eax, dword ptr fs:[00000030h]3_2_018DE016
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE016 mov eax, dword ptr fs:[00000030h]3_2_018DE016
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01956030 mov eax, dword ptr fs:[00000030h]3_2_01956030
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BA020 mov eax, dword ptr fs:[00000030h]3_2_018BA020
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BC020 mov eax, dword ptr fs:[00000030h]3_2_018BC020
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01946050 mov eax, dword ptr fs:[00000030h]3_2_01946050
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C2050 mov eax, dword ptr fs:[00000030h]3_2_018C2050
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EC073 mov eax, dword ptr fs:[00000030h]3_2_018EC073
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E438F mov eax, dword ptr fs:[00000030h]3_2_018E438F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E438F mov eax, dword ptr fs:[00000030h]3_2_018E438F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BE388 mov eax, dword ptr fs:[00000030h]3_2_018BE388
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BE388 mov eax, dword ptr fs:[00000030h]3_2_018BE388
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BE388 mov eax, dword ptr fs:[00000030h]3_2_018BE388
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B8397 mov eax, dword ptr fs:[00000030h]3_2_018B8397
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B8397 mov eax, dword ptr fs:[00000030h]3_2_018B8397
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B8397 mov eax, dword ptr fs:[00000030h]3_2_018B8397
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019643D4 mov eax, dword ptr fs:[00000030h]3_2_019643D4
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019643D4 mov eax, dword ptr fs:[00000030h]3_2_019643D4
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA3C0 mov eax, dword ptr fs:[00000030h]3_2_018CA3C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA3C0 mov eax, dword ptr fs:[00000030h]3_2_018CA3C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA3C0 mov eax, dword ptr fs:[00000030h]3_2_018CA3C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA3C0 mov eax, dword ptr fs:[00000030h]3_2_018CA3C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA3C0 mov eax, dword ptr fs:[00000030h]3_2_018CA3C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA3C0 mov eax, dword ptr fs:[00000030h]3_2_018CA3C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C83C0 mov eax, dword ptr fs:[00000030h]3_2_018C83C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C83C0 mov eax, dword ptr fs:[00000030h]3_2_018C83C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C83C0 mov eax, dword ptr fs:[00000030h]3_2_018C83C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C83C0 mov eax, dword ptr fs:[00000030h]3_2_018C83C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E3DB mov eax, dword ptr fs:[00000030h]3_2_0196E3DB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E3DB mov eax, dword ptr fs:[00000030h]3_2_0196E3DB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E3DB mov ecx, dword ptr fs:[00000030h]3_2_0196E3DB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196E3DB mov eax, dword ptr fs:[00000030h]3_2_0196E3DB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019463C0 mov eax, dword ptr fs:[00000030h]3_2_019463C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197C3CD mov eax, dword ptr fs:[00000030h]3_2_0197C3CD
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D03E9 mov eax, dword ptr fs:[00000030h]3_2_018D03E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D03E9 mov eax, dword ptr fs:[00000030h]3_2_018D03E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D03E9 mov eax, dword ptr fs:[00000030h]3_2_018D03E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D03E9 mov eax, dword ptr fs:[00000030h]3_2_018D03E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D03E9 mov eax, dword ptr fs:[00000030h]3_2_018D03E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D03E9 mov eax, dword ptr fs:[00000030h]3_2_018D03E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D03E9 mov eax, dword ptr fs:[00000030h]3_2_018D03E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D03E9 mov eax, dword ptr fs:[00000030h]3_2_018D03E9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F63FF mov eax, dword ptr fs:[00000030h]3_2_018F63FF
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE3F0 mov eax, dword ptr fs:[00000030h]3_2_018DE3F0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE3F0 mov eax, dword ptr fs:[00000030h]3_2_018DE3F0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE3F0 mov eax, dword ptr fs:[00000030h]3_2_018DE3F0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA30B mov eax, dword ptr fs:[00000030h]3_2_018FA30B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA30B mov eax, dword ptr fs:[00000030h]3_2_018FA30B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA30B mov eax, dword ptr fs:[00000030h]3_2_018FA30B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BC310 mov ecx, dword ptr fs:[00000030h]3_2_018BC310
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E0310 mov ecx, dword ptr fs:[00000030h]3_2_018E0310
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01998324 mov eax, dword ptr fs:[00000030h]3_2_01998324
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01998324 mov ecx, dword ptr fs:[00000030h]3_2_01998324
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01998324 mov eax, dword ptr fs:[00000030h]3_2_01998324
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01998324 mov eax, dword ptr fs:[00000030h]3_2_01998324
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01968350 mov ecx, dword ptr fs:[00000030h]3_2_01968350
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194035C mov eax, dword ptr fs:[00000030h]3_2_0194035C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194035C mov eax, dword ptr fs:[00000030h]3_2_0194035C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194035C mov eax, dword ptr fs:[00000030h]3_2_0194035C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194035C mov ecx, dword ptr fs:[00000030h]3_2_0194035C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194035C mov eax, dword ptr fs:[00000030h]3_2_0194035C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194035C mov eax, dword ptr fs:[00000030h]3_2_0194035C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198A352 mov eax, dword ptr fs:[00000030h]3_2_0198A352
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0199634F mov eax, dword ptr fs:[00000030h]3_2_0199634F
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01942349 mov eax, dword ptr fs:[00000030h]3_2_01942349
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196437C mov eax, dword ptr fs:[00000030h]3_2_0196437C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE284 mov eax, dword ptr fs:[00000030h]3_2_018FE284
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE284 mov eax, dword ptr fs:[00000030h]3_2_018FE284
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01940283 mov eax, dword ptr fs:[00000030h]3_2_01940283
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01940283 mov eax, dword ptr fs:[00000030h]3_2_01940283
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01940283 mov eax, dword ptr fs:[00000030h]3_2_01940283
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D02A0 mov eax, dword ptr fs:[00000030h]3_2_018D02A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D02A0 mov eax, dword ptr fs:[00000030h]3_2_018D02A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019562A0 mov eax, dword ptr fs:[00000030h]3_2_019562A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019562A0 mov ecx, dword ptr fs:[00000030h]3_2_019562A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019562A0 mov eax, dword ptr fs:[00000030h]3_2_019562A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019562A0 mov eax, dword ptr fs:[00000030h]3_2_019562A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019562A0 mov eax, dword ptr fs:[00000030h]3_2_019562A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019562A0 mov eax, dword ptr fs:[00000030h]3_2_019562A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA2C3 mov eax, dword ptr fs:[00000030h]3_2_018CA2C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA2C3 mov eax, dword ptr fs:[00000030h]3_2_018CA2C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA2C3 mov eax, dword ptr fs:[00000030h]3_2_018CA2C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA2C3 mov eax, dword ptr fs:[00000030h]3_2_018CA2C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA2C3 mov eax, dword ptr fs:[00000030h]3_2_018CA2C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019962D6 mov eax, dword ptr fs:[00000030h]3_2_019962D6
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D02E1 mov eax, dword ptr fs:[00000030h]3_2_018D02E1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D02E1 mov eax, dword ptr fs:[00000030h]3_2_018D02E1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D02E1 mov eax, dword ptr fs:[00000030h]3_2_018D02E1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B823B mov eax, dword ptr fs:[00000030h]3_2_018B823B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0199625D mov eax, dword ptr fs:[00000030h]3_2_0199625D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197A250 mov eax, dword ptr fs:[00000030h]3_2_0197A250
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197A250 mov eax, dword ptr fs:[00000030h]3_2_0197A250
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C6259 mov eax, dword ptr fs:[00000030h]3_2_018C6259
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01948243 mov eax, dword ptr fs:[00000030h]3_2_01948243
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01948243 mov ecx, dword ptr fs:[00000030h]3_2_01948243
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BA250 mov eax, dword ptr fs:[00000030h]3_2_018BA250
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B826B mov eax, dword ptr fs:[00000030h]3_2_018B826B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01970274 mov eax, dword ptr fs:[00000030h]3_2_01970274
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C4260 mov eax, dword ptr fs:[00000030h]3_2_018C4260
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C4260 mov eax, dword ptr fs:[00000030h]3_2_018C4260
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C4260 mov eax, dword ptr fs:[00000030h]3_2_018C4260
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F4588 mov eax, dword ptr fs:[00000030h]3_2_018F4588
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C2582 mov eax, dword ptr fs:[00000030h]3_2_018C2582
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C2582 mov ecx, dword ptr fs:[00000030h]3_2_018C2582
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE59C mov eax, dword ptr fs:[00000030h]3_2_018FE59C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019405A7 mov eax, dword ptr fs:[00000030h]3_2_019405A7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019405A7 mov eax, dword ptr fs:[00000030h]3_2_019405A7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019405A7 mov eax, dword ptr fs:[00000030h]3_2_019405A7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E45B1 mov eax, dword ptr fs:[00000030h]3_2_018E45B1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E45B1 mov eax, dword ptr fs:[00000030h]3_2_018E45B1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE5CF mov eax, dword ptr fs:[00000030h]3_2_018FE5CF
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE5CF mov eax, dword ptr fs:[00000030h]3_2_018FE5CF
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C65D0 mov eax, dword ptr fs:[00000030h]3_2_018C65D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA5D0 mov eax, dword ptr fs:[00000030h]3_2_018FA5D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA5D0 mov eax, dword ptr fs:[00000030h]3_2_018FA5D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FC5ED mov eax, dword ptr fs:[00000030h]3_2_018FC5ED
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FC5ED mov eax, dword ptr fs:[00000030h]3_2_018FC5ED
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE5E7 mov eax, dword ptr fs:[00000030h]3_2_018EE5E7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE5E7 mov eax, dword ptr fs:[00000030h]3_2_018EE5E7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE5E7 mov eax, dword ptr fs:[00000030h]3_2_018EE5E7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE5E7 mov eax, dword ptr fs:[00000030h]3_2_018EE5E7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE5E7 mov eax, dword ptr fs:[00000030h]3_2_018EE5E7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE5E7 mov eax, dword ptr fs:[00000030h]3_2_018EE5E7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE5E7 mov eax, dword ptr fs:[00000030h]3_2_018EE5E7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE5E7 mov eax, dword ptr fs:[00000030h]3_2_018EE5E7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C25E0 mov eax, dword ptr fs:[00000030h]3_2_018C25E0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01956500 mov eax, dword ptr fs:[00000030h]3_2_01956500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994500 mov eax, dword ptr fs:[00000030h]3_2_01994500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994500 mov eax, dword ptr fs:[00000030h]3_2_01994500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994500 mov eax, dword ptr fs:[00000030h]3_2_01994500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994500 mov eax, dword ptr fs:[00000030h]3_2_01994500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994500 mov eax, dword ptr fs:[00000030h]3_2_01994500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994500 mov eax, dword ptr fs:[00000030h]3_2_01994500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994500 mov eax, dword ptr fs:[00000030h]3_2_01994500
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE53E mov eax, dword ptr fs:[00000030h]3_2_018EE53E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE53E mov eax, dword ptr fs:[00000030h]3_2_018EE53E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE53E mov eax, dword ptr fs:[00000030h]3_2_018EE53E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE53E mov eax, dword ptr fs:[00000030h]3_2_018EE53E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE53E mov eax, dword ptr fs:[00000030h]3_2_018EE53E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0535 mov eax, dword ptr fs:[00000030h]3_2_018D0535
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0535 mov eax, dword ptr fs:[00000030h]3_2_018D0535
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0535 mov eax, dword ptr fs:[00000030h]3_2_018D0535
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0535 mov eax, dword ptr fs:[00000030h]3_2_018D0535
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0535 mov eax, dword ptr fs:[00000030h]3_2_018D0535
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0535 mov eax, dword ptr fs:[00000030h]3_2_018D0535
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C8550 mov eax, dword ptr fs:[00000030h]3_2_018C8550
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C8550 mov eax, dword ptr fs:[00000030h]3_2_018C8550
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F656A mov eax, dword ptr fs:[00000030h]3_2_018F656A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F656A mov eax, dword ptr fs:[00000030h]3_2_018F656A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F656A mov eax, dword ptr fs:[00000030h]3_2_018F656A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197A49A mov eax, dword ptr fs:[00000030h]3_2_0197A49A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194A4B0 mov eax, dword ptr fs:[00000030h]3_2_0194A4B0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C64AB mov eax, dword ptr fs:[00000030h]3_2_018C64AB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F44B0 mov ecx, dword ptr fs:[00000030h]3_2_018F44B0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C04E5 mov ecx, dword ptr fs:[00000030h]3_2_018C04E5
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F8402 mov eax, dword ptr fs:[00000030h]3_2_018F8402
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F8402 mov eax, dword ptr fs:[00000030h]3_2_018F8402
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F8402 mov eax, dword ptr fs:[00000030h]3_2_018F8402
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BE420 mov eax, dword ptr fs:[00000030h]3_2_018BE420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BE420 mov eax, dword ptr fs:[00000030h]3_2_018BE420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BE420 mov eax, dword ptr fs:[00000030h]3_2_018BE420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BC427 mov eax, dword ptr fs:[00000030h]3_2_018BC427
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01946420 mov eax, dword ptr fs:[00000030h]3_2_01946420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01946420 mov eax, dword ptr fs:[00000030h]3_2_01946420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01946420 mov eax, dword ptr fs:[00000030h]3_2_01946420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01946420 mov eax, dword ptr fs:[00000030h]3_2_01946420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01946420 mov eax, dword ptr fs:[00000030h]3_2_01946420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01946420 mov eax, dword ptr fs:[00000030h]3_2_01946420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01946420 mov eax, dword ptr fs:[00000030h]3_2_01946420
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA430 mov eax, dword ptr fs:[00000030h]3_2_018FA430
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0197A456 mov eax, dword ptr fs:[00000030h]3_2_0197A456
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE443 mov eax, dword ptr fs:[00000030h]3_2_018FE443
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE443 mov eax, dword ptr fs:[00000030h]3_2_018FE443
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE443 mov eax, dword ptr fs:[00000030h]3_2_018FE443
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE443 mov eax, dword ptr fs:[00000030h]3_2_018FE443
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE443 mov eax, dword ptr fs:[00000030h]3_2_018FE443
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE443 mov eax, dword ptr fs:[00000030h]3_2_018FE443
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE443 mov eax, dword ptr fs:[00000030h]3_2_018FE443
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FE443 mov eax, dword ptr fs:[00000030h]3_2_018FE443
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E245A mov eax, dword ptr fs:[00000030h]3_2_018E245A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B645D mov eax, dword ptr fs:[00000030h]3_2_018B645D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194C460 mov ecx, dword ptr fs:[00000030h]3_2_0194C460
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EA470 mov eax, dword ptr fs:[00000030h]3_2_018EA470
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EA470 mov eax, dword ptr fs:[00000030h]3_2_018EA470
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EA470 mov eax, dword ptr fs:[00000030h]3_2_018EA470
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196678E mov eax, dword ptr fs:[00000030h]3_2_0196678E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C07AF mov eax, dword ptr fs:[00000030h]3_2_018C07AF
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019747A0 mov eax, dword ptr fs:[00000030h]3_2_019747A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CC7C0 mov eax, dword ptr fs:[00000030h]3_2_018CC7C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019407C3 mov eax, dword ptr fs:[00000030h]3_2_019407C3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E27ED mov eax, dword ptr fs:[00000030h]3_2_018E27ED
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E27ED mov eax, dword ptr fs:[00000030h]3_2_018E27ED
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E27ED mov eax, dword ptr fs:[00000030h]3_2_018E27ED
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194E7E1 mov eax, dword ptr fs:[00000030h]3_2_0194E7E1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C47FB mov eax, dword ptr fs:[00000030h]3_2_018C47FB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C47FB mov eax, dword ptr fs:[00000030h]3_2_018C47FB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FC700 mov eax, dword ptr fs:[00000030h]3_2_018FC700
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C0710 mov eax, dword ptr fs:[00000030h]3_2_018C0710
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F0710 mov eax, dword ptr fs:[00000030h]3_2_018F0710
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193C730 mov eax, dword ptr fs:[00000030h]3_2_0193C730
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FC720 mov eax, dword ptr fs:[00000030h]3_2_018FC720
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FC720 mov eax, dword ptr fs:[00000030h]3_2_018FC720
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F273C mov eax, dword ptr fs:[00000030h]3_2_018F273C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F273C mov ecx, dword ptr fs:[00000030h]3_2_018F273C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F273C mov eax, dword ptr fs:[00000030h]3_2_018F273C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902750 mov eax, dword ptr fs:[00000030h]3_2_01902750
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902750 mov eax, dword ptr fs:[00000030h]3_2_01902750
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01944755 mov eax, dword ptr fs:[00000030h]3_2_01944755
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F674D mov esi, dword ptr fs:[00000030h]3_2_018F674D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F674D mov eax, dword ptr fs:[00000030h]3_2_018F674D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F674D mov eax, dword ptr fs:[00000030h]3_2_018F674D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194E75D mov eax, dword ptr fs:[00000030h]3_2_0194E75D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C0750 mov eax, dword ptr fs:[00000030h]3_2_018C0750
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C8770 mov eax, dword ptr fs:[00000030h]3_2_018C8770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0770 mov eax, dword ptr fs:[00000030h]3_2_018D0770
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C4690 mov eax, dword ptr fs:[00000030h]3_2_018C4690
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C4690 mov eax, dword ptr fs:[00000030h]3_2_018C4690
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FC6A6 mov eax, dword ptr fs:[00000030h]3_2_018FC6A6
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F66B0 mov eax, dword ptr fs:[00000030h]3_2_018F66B0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA6C7 mov ebx, dword ptr fs:[00000030h]3_2_018FA6C7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA6C7 mov eax, dword ptr fs:[00000030h]3_2_018FA6C7
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E6F2 mov eax, dword ptr fs:[00000030h]3_2_0193E6F2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E6F2 mov eax, dword ptr fs:[00000030h]3_2_0193E6F2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E6F2 mov eax, dword ptr fs:[00000030h]3_2_0193E6F2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E6F2 mov eax, dword ptr fs:[00000030h]3_2_0193E6F2
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019406F1 mov eax, dword ptr fs:[00000030h]3_2_019406F1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019406F1 mov eax, dword ptr fs:[00000030h]3_2_019406F1
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D260B mov eax, dword ptr fs:[00000030h]3_2_018D260B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D260B mov eax, dword ptr fs:[00000030h]3_2_018D260B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D260B mov eax, dword ptr fs:[00000030h]3_2_018D260B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D260B mov eax, dword ptr fs:[00000030h]3_2_018D260B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D260B mov eax, dword ptr fs:[00000030h]3_2_018D260B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D260B mov eax, dword ptr fs:[00000030h]3_2_018D260B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D260B mov eax, dword ptr fs:[00000030h]3_2_018D260B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01902619 mov eax, dword ptr fs:[00000030h]3_2_01902619
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E609 mov eax, dword ptr fs:[00000030h]3_2_0193E609
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C262C mov eax, dword ptr fs:[00000030h]3_2_018C262C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DE627 mov eax, dword ptr fs:[00000030h]3_2_018DE627
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F6620 mov eax, dword ptr fs:[00000030h]3_2_018F6620
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F8620 mov eax, dword ptr fs:[00000030h]3_2_018F8620
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018DC640 mov eax, dword ptr fs:[00000030h]3_2_018DC640
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA660 mov eax, dword ptr fs:[00000030h]3_2_018FA660
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA660 mov eax, dword ptr fs:[00000030h]3_2_018FA660
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198866E mov eax, dword ptr fs:[00000030h]3_2_0198866E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198866E mov eax, dword ptr fs:[00000030h]3_2_0198866E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F2674 mov eax, dword ptr fs:[00000030h]3_2_018F2674
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C09AD mov eax, dword ptr fs:[00000030h]3_2_018C09AD
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C09AD mov eax, dword ptr fs:[00000030h]3_2_018C09AD
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019489B3 mov esi, dword ptr fs:[00000030h]3_2_019489B3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019489B3 mov eax, dword ptr fs:[00000030h]3_2_019489B3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019489B3 mov eax, dword ptr fs:[00000030h]3_2_019489B3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D29A0 mov eax, dword ptr fs:[00000030h]3_2_018D29A0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198A9D3 mov eax, dword ptr fs:[00000030h]3_2_0198A9D3
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019569C0 mov eax, dword ptr fs:[00000030h]3_2_019569C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA9D0 mov eax, dword ptr fs:[00000030h]3_2_018CA9D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA9D0 mov eax, dword ptr fs:[00000030h]3_2_018CA9D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA9D0 mov eax, dword ptr fs:[00000030h]3_2_018CA9D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA9D0 mov eax, dword ptr fs:[00000030h]3_2_018CA9D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA9D0 mov eax, dword ptr fs:[00000030h]3_2_018CA9D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CA9D0 mov eax, dword ptr fs:[00000030h]3_2_018CA9D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F49D0 mov eax, dword ptr fs:[00000030h]3_2_018F49D0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194E9E0 mov eax, dword ptr fs:[00000030h]3_2_0194E9E0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F29F9 mov eax, dword ptr fs:[00000030h]3_2_018F29F9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F29F9 mov eax, dword ptr fs:[00000030h]3_2_018F29F9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194C912 mov eax, dword ptr fs:[00000030h]3_2_0194C912
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B8918 mov eax, dword ptr fs:[00000030h]3_2_018B8918
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B8918 mov eax, dword ptr fs:[00000030h]3_2_018B8918
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E908 mov eax, dword ptr fs:[00000030h]3_2_0193E908
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193E908 mov eax, dword ptr fs:[00000030h]3_2_0193E908
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194892A mov eax, dword ptr fs:[00000030h]3_2_0194892A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0195892B mov eax, dword ptr fs:[00000030h]3_2_0195892B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01940946 mov eax, dword ptr fs:[00000030h]3_2_01940946
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994940 mov eax, dword ptr fs:[00000030h]3_2_01994940
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194C97C mov eax, dword ptr fs:[00000030h]3_2_0194C97C
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E6962 mov eax, dword ptr fs:[00000030h]3_2_018E6962
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E6962 mov eax, dword ptr fs:[00000030h]3_2_018E6962
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E6962 mov eax, dword ptr fs:[00000030h]3_2_018E6962
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01964978 mov eax, dword ptr fs:[00000030h]3_2_01964978
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01964978 mov eax, dword ptr fs:[00000030h]3_2_01964978
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0190096E mov eax, dword ptr fs:[00000030h]3_2_0190096E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0190096E mov edx, dword ptr fs:[00000030h]3_2_0190096E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0190096E mov eax, dword ptr fs:[00000030h]3_2_0190096E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194C89D mov eax, dword ptr fs:[00000030h]3_2_0194C89D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C0887 mov eax, dword ptr fs:[00000030h]3_2_018C0887
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EE8C0 mov eax, dword ptr fs:[00000030h]3_2_018EE8C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_019908C0 mov eax, dword ptr fs:[00000030h]3_2_019908C0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FC8F9 mov eax, dword ptr fs:[00000030h]3_2_018FC8F9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FC8F9 mov eax, dword ptr fs:[00000030h]3_2_018FC8F9
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198A8E4 mov eax, dword ptr fs:[00000030h]3_2_0198A8E4
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194C810 mov eax, dword ptr fs:[00000030h]3_2_0194C810
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196483A mov eax, dword ptr fs:[00000030h]3_2_0196483A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196483A mov eax, dword ptr fs:[00000030h]3_2_0196483A
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E2835 mov eax, dword ptr fs:[00000030h]3_2_018E2835
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E2835 mov eax, dword ptr fs:[00000030h]3_2_018E2835
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E2835 mov eax, dword ptr fs:[00000030h]3_2_018E2835
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E2835 mov ecx, dword ptr fs:[00000030h]3_2_018E2835
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E2835 mov eax, dword ptr fs:[00000030h]3_2_018E2835
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E2835 mov eax, dword ptr fs:[00000030h]3_2_018E2835
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FA830 mov eax, dword ptr fs:[00000030h]3_2_018FA830
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D2840 mov ecx, dword ptr fs:[00000030h]3_2_018D2840
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C4859 mov eax, dword ptr fs:[00000030h]3_2_018C4859
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C4859 mov eax, dword ptr fs:[00000030h]3_2_018C4859
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F0854 mov eax, dword ptr fs:[00000030h]3_2_018F0854
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01956870 mov eax, dword ptr fs:[00000030h]3_2_01956870
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01956870 mov eax, dword ptr fs:[00000030h]3_2_01956870
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194E872 mov eax, dword ptr fs:[00000030h]3_2_0194E872
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194E872 mov eax, dword ptr fs:[00000030h]3_2_0194E872
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01974BB0 mov eax, dword ptr fs:[00000030h]3_2_01974BB0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01974BB0 mov eax, dword ptr fs:[00000030h]3_2_01974BB0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0BBE mov eax, dword ptr fs:[00000030h]3_2_018D0BBE
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0BBE mov eax, dword ptr fs:[00000030h]3_2_018D0BBE
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C0BCD mov eax, dword ptr fs:[00000030h]3_2_018C0BCD
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C0BCD mov eax, dword ptr fs:[00000030h]3_2_018C0BCD
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C0BCD mov eax, dword ptr fs:[00000030h]3_2_018C0BCD
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E0BCB mov eax, dword ptr fs:[00000030h]3_2_018E0BCB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E0BCB mov eax, dword ptr fs:[00000030h]3_2_018E0BCB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E0BCB mov eax, dword ptr fs:[00000030h]3_2_018E0BCB
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196EBD0 mov eax, dword ptr fs:[00000030h]3_2_0196EBD0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194CBF0 mov eax, dword ptr fs:[00000030h]3_2_0194CBF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EEBFC mov eax, dword ptr fs:[00000030h]3_2_018EEBFC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C8BF0 mov eax, dword ptr fs:[00000030h]3_2_018C8BF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C8BF0 mov eax, dword ptr fs:[00000030h]3_2_018C8BF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C8BF0 mov eax, dword ptr fs:[00000030h]3_2_018C8BF0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0193EB1D mov eax, dword ptr fs:[00000030h]3_2_0193EB1D
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994B00 mov eax, dword ptr fs:[00000030h]3_2_01994B00
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EEB20 mov eax, dword ptr fs:[00000030h]3_2_018EEB20
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EEB20 mov eax, dword ptr fs:[00000030h]3_2_018EEB20
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01988B28 mov eax, dword ptr fs:[00000030h]3_2_01988B28
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01988B28 mov eax, dword ptr fs:[00000030h]3_2_01988B28
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0196EB50 mov eax, dword ptr fs:[00000030h]3_2_0196EB50
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01992B57 mov eax, dword ptr fs:[00000030h]3_2_01992B57
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01992B57 mov eax, dword ptr fs:[00000030h]3_2_01992B57
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01992B57 mov eax, dword ptr fs:[00000030h]3_2_01992B57
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01992B57 mov eax, dword ptr fs:[00000030h]3_2_01992B57
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01968B42 mov eax, dword ptr fs:[00000030h]3_2_01968B42
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01956B40 mov eax, dword ptr fs:[00000030h]3_2_01956B40
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01956B40 mov eax, dword ptr fs:[00000030h]3_2_01956B40
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0198AB40 mov eax, dword ptr fs:[00000030h]3_2_0198AB40
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018B8B50 mov eax, dword ptr fs:[00000030h]3_2_018B8B50
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01974B4B mov eax, dword ptr fs:[00000030h]3_2_01974B4B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01974B4B mov eax, dword ptr fs:[00000030h]3_2_01974B4B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018BCB7E mov eax, dword ptr fs:[00000030h]3_2_018BCB7E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018CEA80 mov eax, dword ptr fs:[00000030h]3_2_018CEA80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01994A80 mov eax, dword ptr fs:[00000030h]3_2_01994A80
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F8A90 mov edx, dword ptr fs:[00000030h]3_2_018F8A90
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C8AA0 mov eax, dword ptr fs:[00000030h]3_2_018C8AA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C8AA0 mov eax, dword ptr fs:[00000030h]3_2_018C8AA0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01916AA4 mov eax, dword ptr fs:[00000030h]3_2_01916AA4
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C0AD0 mov eax, dword ptr fs:[00000030h]3_2_018C0AD0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01916ACC mov eax, dword ptr fs:[00000030h]3_2_01916ACC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01916ACC mov eax, dword ptr fs:[00000030h]3_2_01916ACC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_01916ACC mov eax, dword ptr fs:[00000030h]3_2_01916ACC
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F4AD0 mov eax, dword ptr fs:[00000030h]3_2_018F4AD0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018F4AD0 mov eax, dword ptr fs:[00000030h]3_2_018F4AD0
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FAAEE mov eax, dword ptr fs:[00000030h]3_2_018FAAEE
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FAAEE mov eax, dword ptr fs:[00000030h]3_2_018FAAEE
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_0194CA11 mov eax, dword ptr fs:[00000030h]3_2_0194CA11
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018EEA2E mov eax, dword ptr fs:[00000030h]3_2_018EEA2E
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FCA24 mov eax, dword ptr fs:[00000030h]3_2_018FCA24
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018FCA38 mov eax, dword ptr fs:[00000030h]3_2_018FCA38
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E4A35 mov eax, dword ptr fs:[00000030h]3_2_018E4A35
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018E4A35 mov eax, dword ptr fs:[00000030h]3_2_018E4A35
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0A5B mov eax, dword ptr fs:[00000030h]3_2_018D0A5B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018D0A5B mov eax, dword ptr fs:[00000030h]3_2_018D0A5B
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C6A50 mov eax, dword ptr fs:[00000030h]3_2_018C6A50
          Source: C:\Users\user\Desktop\DOC_PDF.exeCode function: 3_2_018C6A50 mov eax, dword ptr fs:[00000030h]3_2_018C6A50
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B602D GetProcessHeap,HeapAlloc,FindFirstFileW,_wcsicmp,_wcsicmp,SetFileAttributesW,GetLastError,DeleteFileW,GetLastError,FindNextFileW,FindClose,RemoveDirectoryW,GetLastError,GetProcessHeap,HeapFree,5_2_002B602D
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002D0C80 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_002D0C80
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\DOC_PDF.exeNtQueueApcThread: Indirect: 0x187A4F2Jump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeNtClose: Indirect: 0x187A56C
          Source: C:\Users\user\Desktop\DOC_PDF.exeMemory written: C:\Users\user\Desktop\DOC_PDF.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: NULL target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection loaded: NULL target: C:\Windows\SysWOW64\msdt.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeThread register set: target process: 1028Jump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeThread register set: target process: 1028Jump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeSection unmapped: C:\Windows\SysWOW64\msdt.exe base address: 280000Jump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002A2710 memset,GetModuleFileNameW,GetLastError,ShellExecuteExW,CreateThread,GetLastError,GetProcessHeap,HeapFree,GetLastError,5_2_002A2710
          Source: C:\Users\user\Desktop\DOC_PDF.exeProcess created: C:\Users\user\Desktop\DOC_PDF.exe "C:\Users\user\Desktop\DOC_PDF.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\Desktop\DOC_PDF.exe"Jump to behavior
          Source: explorer.exe, 00000004.00000003.3828353043.0000000009C21000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095363087.0000000009B95000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
          Source: explorer.exe, 00000004.00000002.4503812385.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2043823807.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
          Source: explorer.exe, 00000004.00000002.4506324559.0000000004B00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4503812385.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2043823807.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000002.4503812385.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2043823807.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000004.00000002.4503812385.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2043823807.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000004.00000000.2043320694.0000000000EF8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4502583953.0000000000EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman
          Source: C:\Users\user\Desktop\DOC_PDF.exeQueries volume information: C:\Users\user\Desktop\DOC_PDF.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\DOC_PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B7E50 GetProcessHeap,HeapAlloc,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetLastError,CreateEventW,CreateNamedPipeW,ConnectNamedPipe,GetLastError,GetLastError,GetLastError,GetProcessHeap,HeapFree,LocalFree,5_2_002B7E50
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_002B7A8E GetSystemTime,5_2_002B7A8E
          Source: C:\Windows\SysWOW64\msdt.exeCode function: 5_2_00294764 GetProcessHeap,HeapAlloc,GetUserNameExW,GetLastError,SysFreeString,GetProcessHeap,HeapFree,5_2_00294764
          Source: C:\Users\user\Desktop\DOC_PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.2.DOC_PDF.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.DOC_PDF.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Shared Modules
          1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          1
          Credential API Hooking
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          2
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Abuse Elevation Control Mechanism
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          Account Discovery
          Remote Desktop Protocol1
          Credential API Hooking
          1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          Security Account Manager2
          File and Directory Discovery
          SMB/Windows Admin Shares2
          Clipboard Data
          11
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook513
          Process Injection
          4
          Obfuscated Files or Information
          NTDS213
          System Information Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
          Software Packing
          LSA Secrets241
          Security Software Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Timestomp
          Cached Domain Credentials2
          Process Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSync41
          Virtualization/Sandbox Evasion
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Rootkit
          Proc Filesystem1
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Masquerading
          /etc/passwd and /etc/shadow1
          System Owner/User Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron41
          Virtualization/Sandbox Evasion
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd513
          Process Injection
          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519409 Sample: DOC_PDF.exe Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 29 www.utebolshirts.shop 2->29 31 www.rojectleadzone.website 2->31 33 9 other IPs or domains 2->33 35 Found malware configuration 2->35 37 Malicious sample detected (through community Yara rule) 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 9 other signatures 2->41 11 DOC_PDF.exe 3 2->11         started        signatures3 process4 file5 27 C:\Users\user\AppData\...\DOC_PDF.exe.log, ASCII 11->27 dropped 49 Tries to detect virtualization through RDTSC time measurements 11->49 51 Injects a PE file into a foreign processes 11->51 53 Switches to a custom stack to bypass stack traces 11->53 15 DOC_PDF.exe 11->15         started        signatures6 process7 signatures8 55 Modifies the context of a thread in another process (thread injection) 15->55 57 Maps a DLL or memory area into another process 15->57 59 Sample uses process hollowing technique 15->59 61 2 other signatures 15->61 18 explorer.exe 98 7 15->18 injected process9 process10 20 msdt.exe 18->20         started        signatures11 43 Modifies the context of a thread in another process (thread injection) 20->43 45 Maps a DLL or memory area into another process 20->45 47 Tries to detect virtualization through RDTSC time measurements 20->47 23 cmd.exe 1 20->23         started        process12 process13 25 conhost.exe 23->25         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          DOC_PDF.exe58%ReversingLabsWin32.Backdoor.FormBook
          DOC_PDF.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://excel.office.com0%URL Reputationsafe
          http://schemas.micro0%URL Reputationsafe
          https://android.notify.windows.com/iOS0%URL Reputationsafe
          https://api.msn.com/0%URL Reputationsafe
          https://word.office.comon0%Avira URL Cloudsafe
          http://www.resdai.xyzReferer:0%Avira URL Cloudsafe
          http://www.bykmr.shop/b31a/www.utebolshirts.shop0%Avira URL Cloudsafe
          http://www.indjuvedermdoctorsnearby.todayReferer:0%Avira URL Cloudsafe
          http://www.rojectleadzone.website/b31a/0%Avira URL Cloudsafe
          https://powerpoint.office.comcember0%Avira URL Cloudsafe
          http://www.hegdg.netReferer:0%Avira URL Cloudsafe
          http://www.resdai.xyz0%Avira URL Cloudsafe
          http://www.ashforhouse19.onlineReferer:0%Avira URL Cloudsafe
          http://www.rojectleadzone.website0%Avira URL Cloudsafe
          http://www.resdai.xyz/b31a/0%Avira URL Cloudsafe
          www.awlc7038.vip/b31a/0%Avira URL Cloudsafe
          http://www.awlc7038.vip/b31a/www.rojectleadzone.website0%Avira URL Cloudsafe
          http://www.igh-class-jewelry.infoReferer:0%Avira URL Cloudsafe
          http://www.2239d3.christmasReferer:0%Avira URL Cloudsafe
          http://www.aemoruhagic.click/b31a/www.-web-p102.buzz0%Avira URL Cloudsafe
          http://www.utebolshirts.shop/b31a/www.resdai.xyz0%Avira URL Cloudsafe
          http://www.utebolshirts.shop0%Avira URL Cloudsafe
          http://www.olf-cart-82894.bond0%Avira URL Cloudsafe
          http://www.igh-class-jewelry.info/b31a/0%Avira URL Cloudsafe
          http://www.indjuvedermdoctorsnearby.today/b31a/0%Avira URL Cloudsafe
          http://www.rojectleadzone.websiteReferer:0%Avira URL Cloudsafe
          http://www.indjuvedermdoctorsnearby.today0%Avira URL Cloudsafe
          http://www.autoitscript.E0%Avira URL Cloudsafe
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe0%Avira URL Cloudsafe
          http://www.ewancash.boats0%Avira URL Cloudsafe
          http://www.indjuvedermdoctorsnearby.today/b31a/www.ashforhouse19.online0%Avira URL Cloudsafe
          http://www.utebolshirts.shop/b31a/0%Avira URL Cloudsafe
          http://www.olf-cart-82894.bond/b31a/www.hewieandfriends.info0%Avira URL Cloudsafe
          http://www.awlc7038.vip/b31a/0%Avira URL Cloudsafe
          http://www.ewancash.boatsReferer:0%Avira URL Cloudsafe
          http://www.48827496.topReferer:0%Avira URL Cloudsafe
          http://www.aemoruhagic.clickReferer:0%Avira URL Cloudsafe
          http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
          https://wns.windows.com/)s0%Avira URL Cloudsafe
          http://www.-web-p102.buzz/b31a/www.indjuvedermdoctorsnearby.today0%Avira URL Cloudsafe
          http://www.igh-class-jewelry.info0%Avira URL Cloudsafe
          http://www.-web-p102.buzz0%Avira URL Cloudsafe
          http://www.2239d3.christmas/b31a/0%Avira URL Cloudsafe
          http://www.hegdg.net0%Avira URL Cloudsafe
          http://www.hewieandfriends.info/b31a/www.ewancash.boats0%Avira URL Cloudsafe
          http://www.48827496.top0%Avira URL Cloudsafe
          http://www.48827496.top/b31a/0%Avira URL Cloudsafe
          http://www.bykmr.shopReferer:0%Avira URL Cloudsafe
          http://www.ashforhouse19.online0%Avira URL Cloudsafe
          http://www.awlc7038.vip0%Avira URL Cloudsafe
          http://www.igh-class-jewelry.info/b31a/www.48827496.top0%Avira URL Cloudsafe
          http://www.ewancash.boats/b31a/www.igh-class-jewelry.info0%Avira URL Cloudsafe
          http://www.-web-p102.buzz/b31a/0%Avira URL Cloudsafe
          http://www.hewieandfriends.infoReferer:0%Avira URL Cloudsafe
          http://www.-web-p102.buzzReferer:0%Avira URL Cloudsafe
          http://www.resdai.xyz/b31a/www.hegdg.net0%Avira URL Cloudsafe
          http://www.rojectleadzone.website/b31a/www.olf-cart-82894.bond0%Avira URL Cloudsafe
          http://www.olf-cart-82894.bond/b31a/0%Avira URL Cloudsafe
          https://outlook.com0%Avira URL Cloudsafe
          http://www.ewancash.boats/b31a/0%Avira URL Cloudsafe
          http://www.hewieandfriends.info0%Avira URL Cloudsafe
          http://www.hegdg.net/b31a/0%Avira URL Cloudsafe
          http://www.bykmr.shop/b31a/0%Avira URL Cloudsafe
          http://www.hewieandfriends.info/b31a/0%Avira URL Cloudsafe
          http://www.aemoruhagic.click0%Avira URL Cloudsafe
          http://www.bykmr.shop0%Avira URL Cloudsafe
          http://www.2239d3.christmas/b31a/h0%Avira URL Cloudsafe
          http://www.2239d3.christmas0%Avira URL Cloudsafe
          http://www.utebolshirts.shopReferer:0%Avira URL Cloudsafe
          http://www.aemoruhagic.click/b31a/0%Avira URL Cloudsafe
          http://www.olf-cart-82894.bondReferer:0%Avira URL Cloudsafe
          http://www.hegdg.net/b31a/www.aemoruhagic.click0%Avira URL Cloudsafe
          http://www.48827496.top/b31a/www.bykmr.shop0%Avira URL Cloudsafe
          http://www.awlc7038.vipReferer:0%Avira URL Cloudsafe
          http://www.ashforhouse19.online/b31a/www.2239d3.christmas0%Avira URL Cloudsafe
          http://crl.v0%Avira URL Cloudsafe
          http://www.ashforhouse19.online/b31a/0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.awlc7038.vip
          unknown
          unknowntrue
            unknown
            www.48827496.top
            unknown
            unknowntrue
              unknown
              www.olf-cart-82894.bond
              unknown
              unknowntrue
                unknown
                www.ewancash.boats
                unknown
                unknowntrue
                  unknown
                  www.aemoruhagic.click
                  unknown
                  unknowntrue
                    unknown
                    www.rojectleadzone.website
                    unknown
                    unknowntrue
                      unknown
                      www.bykmr.shop
                      unknown
                      unknowntrue
                        unknown
                        www.utebolshirts.shop
                        unknown
                        unknowntrue
                          unknown
                          www.hegdg.net
                          unknown
                          unknowntrue
                            unknown
                            www.hewieandfriends.info
                            unknown
                            unknowntrue
                              unknown
                              www.igh-class-jewelry.info
                              unknown
                              unknowntrue
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                www.awlc7038.vip/b31a/true
                                • Avira URL Cloud: safe
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://word.office.comonexplorer.exe, 00000004.00000003.3094195569.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.resdai.xyzReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.rojectleadzone.websiteexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.rojectleadzone.website/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.indjuvedermdoctorsnearby.todayReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.resdai.xyzexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.bykmr.shop/b31a/www.utebolshirts.shopexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.hegdg.netReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://powerpoint.office.comcemberexplorer.exe, 00000004.00000002.4516483645.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2062045915.000000000C460000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ashforhouse19.onlineReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.awlc7038.vip/b31a/www.rojectleadzone.websiteexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.resdai.xyz/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.utebolshirts.shopexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://excel.office.comexplorer.exe, 00000004.00000003.3828353043.0000000009C21000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095363087.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3826265427.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4513465744.0000000009C22000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.microexplorer.exe, 00000004.00000000.2057955900.0000000008870000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000002.4508804572.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2057404332.0000000007DC0000.00000002.00000001.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.igh-class-jewelry.infoReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.olf-cart-82894.bondexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.igh-class-jewelry.info/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.aemoruhagic.click/b31a/www.-web-p102.buzzexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.utebolshirts.shop/b31a/www.resdai.xyzexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.2239d3.christmasReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.indjuvedermdoctorsnearby.today/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.autoitscript.Eexplorer.exe, 00000004.00000003.3825649798.000000000C8EB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095300966.000000000C8E8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3102191852.000000000C8EB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3093866051.000000000C8E8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2062761599.000000000C8E8000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.indjuvedermdoctorsnearby.todayexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.rojectleadzone.websiteReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.utebolshirts.shop/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.olf-cart-82894.bond/b31a/www.hewieandfriends.infoexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ewancash.boatsexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000004.00000002.4516483645.000000000C4DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2062045915.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.indjuvedermdoctorsnearby.today/b31a/www.ashforhouse19.onlineexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.awlc7038.vip/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ewancash.boatsReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.48827496.topReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.aemoruhagic.clickReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.igh-class-jewelry.infoexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://wns.windows.com/)sexplorer.exe, 00000004.00000003.3094195569.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4510666183.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000004.00000000.2062761599.000000000C8BC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095300966.000000000C8DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3093866051.000000000C8BC000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.-web-p102.buzz/b31a/www.indjuvedermdoctorsnearby.todayexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.-web-p102.buzzexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.2239d3.christmas/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.hegdg.netexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.48827496.topexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.hewieandfriends.info/b31a/www.ewancash.boatsexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.48827496.top/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ashforhouse19.onlineexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.bykmr.shopReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.awlc7038.vipexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.igh-class-jewelry.info/b31a/www.48827496.topexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ewancash.boats/b31a/www.igh-class-jewelry.infoexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.-web-p102.buzz/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.hewieandfriends.infoReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.-web-p102.buzzReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.resdai.xyz/b31a/www.hegdg.netexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.rojectleadzone.website/b31a/www.olf-cart-82894.bondexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.olf-cart-82894.bond/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://outlook.comexplorer.exe, 00000004.00000000.2058647031.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4513550393.0000000009C96000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095363087.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3826265427.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009B41000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3827270143.0000000009C92000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.hewieandfriends.infoexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ewancash.boats/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.hegdg.net/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.bykmr.shop/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.hewieandfriends.info/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.aemoruhagic.clickexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://android.notify.windows.com/iOSexplorer.exe, 00000004.00000003.3827896321.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4506643376.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2056628232.00000000076F8000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.bykmr.shopexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.2239d3.christmas/b31a/hexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.2239d3.christmasexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://api.msn.com/explorer.exe, 00000004.00000002.4510666183.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2058647031.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3094195569.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.utebolshirts.shopReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.aemoruhagic.click/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ashforhouse19.online/b31a/www.2239d3.christmasexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.olf-cart-82894.bondReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.hegdg.net/b31a/www.aemoruhagic.clickexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.48827496.top/b31a/www.bykmr.shopexplorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.awlc7038.vipReferer:explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.vexplorer.exe, 00000004.00000000.2043320694.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.4502583953.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ashforhouse19.online/b31a/explorer.exe, 00000004.00000002.4504664201.0000000003545000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3100427962.0000000003544000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3095856297.000000000353D000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                No contacted IP infos
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1519409
                                Start date and time:2024-09-26 13:44:08 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 11m 11s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:9
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:1
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:DOC_PDF.exe
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@8/1@11/0
                                EGA Information:
                                • Successful, ratio: 75%
                                HCA Information:
                                • Successful, ratio: 98%
                                • Number of executed functions: 114
                                • Number of non-executed functions: 370
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Execution Graph export aborted for target explorer.exe, PID 1028 because there are no executed function
                                • Not all processes where analyzed, report is missing behavior information
                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtEnumerateKey calls found.
                                • Report size getting too big, too many NtOpenKey calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: DOC_PDF.exe
                                TimeTypeDescription
                                07:44:58API Interceptor1x Sleep call for process: DOC_PDF.exe modified
                                07:45:01API Interceptor8919275x Sleep call for process: explorer.exe modified
                                07:45:41API Interceptor7922880x Sleep call for process: msdt.exe modified
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Users\user\Desktop\DOC_PDF.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.34331486778365
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.798054982173893
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:DOC_PDF.exe
                                File size:611'328 bytes
                                MD5:debff2e29172e4c6b07a62a5d7b8a6b4
                                SHA1:6e2073a1f0dbd338f0a8673f35b8628581fac402
                                SHA256:874c6faee7e17445012c0f573c29dde997a71cc86e15fc3152a22365cf83bdf1
                                SHA512:565cccea3f2b0214e64e352a0676465c6b6792da5d7f77a9e97463c7ebb0fd8ab71baa835fa586268c425aa01577cf5ff5a3d7f652a9c1f6fb568757713b59f1
                                SSDEEP:12288:v0FSVDrE1Sytj7ueTw98NxmngEFTas9VdqJGQ/UUakA/k3Q8bQbZ:I1Sytj71LSdOqa4UakZTI
                                TLSH:40D401052656C913D4EA4FF409B1D6B8527A2E9EA916C30B9FDEBEDF7C3A3421940343
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..J..........fh... ........@.. ....................................@................................
                                Icon Hash:00928e8e8686b000
                                Entrypoint:0x496866
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0xCCFF9492 [Mon Dec 26 17:36:18 2078 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x968110x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x980000x5b4.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a0000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x94ef80x70.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x9486c0x94a0088d25af99f4fbced339e4a5f26bb9885False0.9201255650756939data7.806630339806879IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x980000x5b40x6008b2686e544781396c07b7ab3c05a6dcbFalse0.4231770833333333data4.096483433036811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x9a0000xc0x2004f4a9ca30ab2e8dbdba16650bbada546False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_VERSION0x980900x324data0.43407960199004975
                                RT_MANIFEST0x983c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Sep 26, 2024 13:45:34.016469955 CEST6538753192.168.2.51.1.1.1
                                Sep 26, 2024 13:45:34.025757074 CEST53653871.1.1.1192.168.2.5
                                Sep 26, 2024 13:45:55.797008038 CEST5122753192.168.2.51.1.1.1
                                Sep 26, 2024 13:45:55.807245016 CEST53512271.1.1.1192.168.2.5
                                Sep 26, 2024 13:46:14.644463062 CEST6437153192.168.2.51.1.1.1
                                Sep 26, 2024 13:46:14.657212019 CEST53643711.1.1.1192.168.2.5
                                Sep 26, 2024 13:46:35.070553064 CEST6108853192.168.2.51.1.1.1
                                Sep 26, 2024 13:46:35.086643934 CEST53610881.1.1.1192.168.2.5
                                Sep 26, 2024 13:46:56.610105991 CEST6465953192.168.2.51.1.1.1
                                Sep 26, 2024 13:46:56.620161057 CEST53646591.1.1.1192.168.2.5
                                Sep 26, 2024 13:47:17.049792051 CEST5334553192.168.2.51.1.1.1
                                Sep 26, 2024 13:47:17.065444946 CEST53533451.1.1.1192.168.2.5
                                Sep 26, 2024 13:47:37.860259056 CEST6372853192.168.2.51.1.1.1
                                Sep 26, 2024 13:47:38.333216906 CEST53637281.1.1.1192.168.2.5
                                Sep 26, 2024 13:47:58.901911020 CEST5758053192.168.2.51.1.1.1
                                Sep 26, 2024 13:47:58.914411068 CEST53575801.1.1.1192.168.2.5
                                Sep 26, 2024 13:48:19.814678907 CEST5175053192.168.2.51.1.1.1
                                Sep 26, 2024 13:48:19.827140093 CEST53517501.1.1.1192.168.2.5
                                Sep 26, 2024 13:49:00.621493101 CEST5937853192.168.2.51.1.1.1
                                Sep 26, 2024 13:49:01.149178982 CEST53593781.1.1.1192.168.2.5
                                Sep 26, 2024 13:49:21.876873970 CEST6337153192.168.2.51.1.1.1
                                Sep 26, 2024 13:49:21.895679951 CEST53633711.1.1.1192.168.2.5
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Sep 26, 2024 13:45:34.016469955 CEST192.168.2.51.1.1.10x161Standard query (0)www.awlc7038.vipA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:45:55.797008038 CEST192.168.2.51.1.1.10x9203Standard query (0)www.rojectleadzone.websiteA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:46:14.644463062 CEST192.168.2.51.1.1.10xfc44Standard query (0)www.olf-cart-82894.bondA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:46:35.070553064 CEST192.168.2.51.1.1.10x3817Standard query (0)www.hewieandfriends.infoA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:46:56.610105991 CEST192.168.2.51.1.1.10x67b9Standard query (0)www.ewancash.boatsA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:47:17.049792051 CEST192.168.2.51.1.1.10x2864Standard query (0)www.igh-class-jewelry.infoA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:47:37.860259056 CEST192.168.2.51.1.1.10xe73bStandard query (0)www.48827496.topA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:47:58.901911020 CEST192.168.2.51.1.1.10x75cdStandard query (0)www.bykmr.shopA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:48:19.814678907 CEST192.168.2.51.1.1.10x552aStandard query (0)www.utebolshirts.shopA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:49:00.621493101 CEST192.168.2.51.1.1.10x8664Standard query (0)www.hegdg.netA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:49:21.876873970 CEST192.168.2.51.1.1.10x6ea4Standard query (0)www.aemoruhagic.clickA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Sep 26, 2024 13:45:34.025757074 CEST1.1.1.1192.168.2.50x161Name error (3)www.awlc7038.vipnonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:45:55.807245016 CEST1.1.1.1192.168.2.50x9203Name error (3)www.rojectleadzone.websitenonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:46:14.657212019 CEST1.1.1.1192.168.2.50xfc44Name error (3)www.olf-cart-82894.bondnonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:46:35.086643934 CEST1.1.1.1192.168.2.50x3817Name error (3)www.hewieandfriends.infononenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:46:56.620161057 CEST1.1.1.1192.168.2.50x67b9Name error (3)www.ewancash.boatsnonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:47:17.065444946 CEST1.1.1.1192.168.2.50x2864Name error (3)www.igh-class-jewelry.infononenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:47:38.333216906 CEST1.1.1.1192.168.2.50xe73bName error (3)www.48827496.topnonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:47:58.914411068 CEST1.1.1.1192.168.2.50x75cdName error (3)www.bykmr.shopnonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:48:19.827140093 CEST1.1.1.1192.168.2.50x552aName error (3)www.utebolshirts.shopnonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:49:01.149178982 CEST1.1.1.1192.168.2.50x8664Name error (3)www.hegdg.netnonenoneA (IP address)IN (0x0001)false
                                Sep 26, 2024 13:49:21.895679951 CEST1.1.1.1192.168.2.50x6ea4Name error (3)www.aemoruhagic.clicknonenoneA (IP address)IN (0x0001)false

                                Code Manipulations

                                Function NameHook TypeActive in Processes
                                PeekMessageAINLINEexplorer.exe
                                PeekMessageWINLINEexplorer.exe
                                GetMessageWINLINEexplorer.exe
                                GetMessageAINLINEexplorer.exe
                                Function NameHook TypeNew Data
                                PeekMessageAINLINE0x48 0x8B 0xB8 0x87 0x7E 0xE1
                                PeekMessageWINLINE0x48 0x8B 0xB8 0x8F 0xFE 0xE1
                                GetMessageWINLINE0x48 0x8B 0xB8 0x8F 0xFE 0xE1
                                GetMessageAINLINE0x48 0x8B 0xB8 0x87 0x7E 0xE1

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:07:44:57
                                Start date:26/09/2024
                                Path:C:\Users\user\Desktop\DOC_PDF.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\DOC_PDF.exe"
                                Imagebase:0xed0000
                                File size:611'328 bytes
                                MD5 hash:DEBFF2E29172E4C6B07A62A5D7B8A6B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.2063004300.00000000045CB000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.2063004300.000000000448F000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:07:44:58
                                Start date:26/09/2024
                                Path:C:\Users\user\Desktop\DOC_PDF.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\DOC_PDF.exe"
                                Imagebase:0xe00000
                                File size:611'328 bytes
                                MD5 hash:DEBFF2E29172E4C6B07A62A5D7B8A6B4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low
                                Has exited:true

                                Target ID:4
                                Start time:07:44:58
                                Start date:26/09/2024
                                Path:C:\Windows\explorer.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\Explorer.EXE
                                Imagebase:0x7ff674740000
                                File size:5'141'208 bytes
                                MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: Windows_Trojan_Formbook_772cc62d, Description: unknown, Source: 00000004.00000002.4519710590.0000000010520000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                Reputation:high
                                Has exited:false

                                Target ID:5
                                Start time:07:45:01
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\msdt.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\SysWOW64\msdt.exe"
                                Imagebase:0x280000
                                File size:389'632 bytes
                                MD5 hash:BAA4458E429E7C906560FE4541ADFCFB
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.4503198454.0000000004C50000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.4503303380.0000000004C80000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:moderate
                                Has exited:false

                                Target ID:6
                                Start time:07:45:05
                                Start date:26/09/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:/c del "C:\Users\user\Desktop\DOC_PDF.exe"
                                Imagebase:0x790000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:7
                                Start time:07:45:05
                                Start date:26/09/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff6d64d0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:10.5%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:4.1%
                                  Total number of Nodes:244
                                  Total number of Limit Nodes:8
                                  execution_graph 33334 173aff0 33338 173b0e8 33334->33338 33343 173b0d8 33334->33343 33335 173afff 33339 173b11c 33338->33339 33340 173b0f9 33338->33340 33339->33335 33340->33339 33341 173b320 GetModuleHandleW 33340->33341 33342 173b34d 33341->33342 33342->33335 33344 173b11c 33343->33344 33345 173b0f9 33343->33345 33344->33335 33345->33344 33346 173b320 GetModuleHandleW 33345->33346 33347 173b34d 33346->33347 33347->33335 33630 173d380 33631 173d3c6 GetCurrentProcess 33630->33631 33633 173d411 33631->33633 33634 173d418 GetCurrentThread 33631->33634 33633->33634 33635 173d455 GetCurrentProcess 33634->33635 33636 173d44e 33634->33636 33637 173d48b 33635->33637 33636->33635 33638 173d4b3 GetCurrentThreadId 33637->33638 33639 173d4e4 33638->33639 33545 8359c60 33546 8359deb 33545->33546 33548 8359c86 33545->33548 33547 8356200 PostMessageW 33547->33548 33548->33546 33548->33547 33348 8357c72 33349 8357be4 33348->33349 33350 8357df7 33349->33350 33353 83589e0 33349->33353 33371 83589d0 33349->33371 33354 83589fa 33353->33354 33355 8358a1e 33354->33355 33389 83593f3 33354->33389 33393 835928b 33354->33393 33398 8358d68 33354->33398 33404 83594ae 33354->33404 33408 8359083 33354->33408 33413 8358fe6 33354->33413 33418 8359666 33354->33418 33423 8359585 33354->33423 33428 8359018 33354->33428 33433 8358d58 33354->33433 33439 8358fd9 33354->33439 33444 83592be 33354->33444 33449 835923d 33354->33449 33454 8358f9d 33354->33454 33460 835903d 33354->33460 33355->33350 33372 83589fa 33371->33372 33373 8358a1e 33372->33373 33374 83593f3 2 API calls 33372->33374 33375 835903d 2 API calls 33372->33375 33376 8358f9d 2 API calls 33372->33376 33377 835923d 2 API calls 33372->33377 33378 83592be 2 API calls 33372->33378 33379 8358fd9 2 API calls 33372->33379 33380 8358d58 2 API calls 33372->33380 33381 8359018 2 API calls 33372->33381 33382 8359585 2 API calls 33372->33382 33383 8359666 2 API calls 33372->33383 33384 8358fe6 2 API calls 33372->33384 33385 8359083 2 API calls 33372->33385 33386 83594ae 2 API calls 33372->33386 33387 8358d68 2 API calls 33372->33387 33388 835928b 2 API calls 33372->33388 33373->33350 33374->33373 33375->33373 33376->33373 33377->33373 33378->33373 33379->33373 33380->33373 33381->33373 33382->33373 33383->33373 33384->33373 33385->33373 33386->33373 33387->33373 33388->33373 33464 83573a8 33389->33464 33468 83573a1 33389->33468 33390 8359410 33394 835959c 33393->33394 33395 83595c0 33394->33395 33472 8357540 33394->33472 33476 8357539 33394->33476 33400 8358d9b 33398->33400 33399 8358e3e 33399->33355 33400->33399 33480 83577bd 33400->33480 33484 83577c8 33400->33484 33401 8358f4c 33401->33355 33405 83594c0 33404->33405 33488 8357480 33405->33488 33492 8357479 33405->33492 33409 835966d 33408->33409 33496 8357630 33409->33496 33500 8357628 33409->33500 33410 8359225 33410->33355 33414 83597e1 33413->33414 33416 83573a1 Wow64SetThreadContext 33414->33416 33417 83573a8 Wow64SetThreadContext 33414->33417 33415 83597ff 33416->33415 33417->33415 33419 835966c 33418->33419 33420 8359225 33419->33420 33421 8357630 ReadProcessMemory 33419->33421 33422 8357628 ReadProcessMemory 33419->33422 33420->33355 33421->33420 33422->33420 33424 835958b 33423->33424 33426 8357540 WriteProcessMemory 33424->33426 33427 8357539 WriteProcessMemory 33424->33427 33425 83595c0 33426->33425 33427->33425 33429 835901e 33428->33429 33504 83572f0 33429->33504 33508 83572f8 33429->33508 33430 835926c 33435 8358d9b 33433->33435 33434 8358e3e 33434->33355 33435->33434 33437 83577bd CreateProcessA 33435->33437 33438 83577c8 CreateProcessA 33435->33438 33436 8358f4c 33436->33355 33437->33436 33438->33436 33440 8358fe2 33439->33440 33442 83572f0 ResumeThread 33440->33442 33443 83572f8 ResumeThread 33440->33443 33441 835926c 33442->33441 33443->33441 33445 83592e1 33444->33445 33447 8357540 WriteProcessMemory 33445->33447 33448 8357539 WriteProcessMemory 33445->33448 33446 8359566 33447->33446 33448->33446 33450 8359243 33449->33450 33452 83572f0 ResumeThread 33450->33452 33453 83572f8 ResumeThread 33450->33453 33451 835926c 33452->33451 33453->33451 33456 8358fba 33454->33456 33455 8359470 33455->33355 33456->33455 33458 83572f0 ResumeThread 33456->33458 33459 83572f8 ResumeThread 33456->33459 33457 835926c 33458->33457 33459->33457 33462 8357540 WriteProcessMemory 33460->33462 33463 8357539 WriteProcessMemory 33460->33463 33461 8358f89 33461->33355 33462->33461 33463->33461 33465 83573ed Wow64SetThreadContext 33464->33465 33467 8357435 33465->33467 33467->33390 33469 83573ed Wow64SetThreadContext 33468->33469 33471 8357435 33469->33471 33471->33390 33473 8357588 WriteProcessMemory 33472->33473 33475 83575df 33473->33475 33475->33395 33477 8357540 WriteProcessMemory 33476->33477 33479 83575df 33477->33479 33479->33395 33481 8357851 CreateProcessA 33480->33481 33483 8357a13 33481->33483 33483->33483 33485 8357851 CreateProcessA 33484->33485 33487 8357a13 33485->33487 33487->33487 33489 83574c0 VirtualAllocEx 33488->33489 33491 83574fd 33489->33491 33491->33405 33493 8357480 VirtualAllocEx 33492->33493 33495 83574fd 33493->33495 33495->33405 33497 835767b ReadProcessMemory 33496->33497 33499 83576bf 33497->33499 33499->33410 33501 835767b ReadProcessMemory 33500->33501 33503 83576bf 33501->33503 33503->33410 33505 8357338 ResumeThread 33504->33505 33507 8357369 33505->33507 33507->33430 33509 8357338 ResumeThread 33508->33509 33511 8357369 33509->33511 33511->33430 33549 146d01c 33550 146d034 33549->33550 33551 146d08e 33550->33551 33557 33b1e99 33550->33557 33561 33b115c 33550->33561 33571 33b2c08 33550->33571 33581 33b1ea8 33550->33581 33585 33b10e9 33550->33585 33558 33b1ece 33557->33558 33559 33b115c CallWindowProcW 33558->33559 33560 33b1eef 33559->33560 33560->33551 33562 33b1167 33561->33562 33563 33b2c79 33562->33563 33565 33b2c69 33562->33565 33617 33b1284 33563->33617 33596 33b2e6c 33565->33596 33602 33b2d9f 33565->33602 33607 33b2da0 33565->33607 33612 33b2d90 33565->33612 33566 33b2c77 33573 33b2c45 33571->33573 33572 33b2c79 33574 33b1284 CallWindowProcW 33572->33574 33573->33572 33575 33b2c69 33573->33575 33576 33b2c77 33574->33576 33577 33b2d9f CallWindowProcW 33575->33577 33578 33b2e6c CallWindowProcW 33575->33578 33579 33b2da0 CallWindowProcW 33575->33579 33580 33b2d90 CallWindowProcW 33575->33580 33577->33576 33578->33576 33579->33576 33580->33576 33582 33b1ece 33581->33582 33583 33b115c CallWindowProcW 33582->33583 33584 33b1eef 33583->33584 33584->33551 33587 33b10ed 33585->33587 33586 33b116c 33587->33586 33588 33b2c79 33587->33588 33590 33b2c69 33587->33590 33589 33b1284 CallWindowProcW 33588->33589 33591 33b2c77 33589->33591 33592 33b2d9f CallWindowProcW 33590->33592 33593 33b2e6c CallWindowProcW 33590->33593 33594 33b2da0 CallWindowProcW 33590->33594 33595 33b2d90 CallWindowProcW 33590->33595 33592->33591 33593->33591 33594->33591 33595->33591 33597 33b2e7a 33596->33597 33598 33b2e2a 33596->33598 33621 33b2e58 33598->33621 33624 33b2e57 33598->33624 33599 33b2e40 33599->33566 33604 33b2db4 33602->33604 33603 33b2e40 33603->33566 33605 33b2e58 CallWindowProcW 33604->33605 33606 33b2e57 CallWindowProcW 33604->33606 33605->33603 33606->33603 33609 33b2db4 33607->33609 33608 33b2e40 33608->33566 33610 33b2e58 CallWindowProcW 33609->33610 33611 33b2e57 CallWindowProcW 33609->33611 33610->33608 33611->33608 33614 33b2dd1 33612->33614 33613 33b2e40 33613->33566 33615 33b2e58 CallWindowProcW 33614->33615 33616 33b2e57 CallWindowProcW 33614->33616 33615->33613 33616->33613 33618 33b128f 33617->33618 33619 33b435a CallWindowProcW 33618->33619 33620 33b4309 33618->33620 33619->33620 33620->33566 33622 33b2e69 33621->33622 33627 33b42a0 33621->33627 33622->33599 33625 33b2e69 33624->33625 33626 33b42a0 CallWindowProcW 33624->33626 33625->33599 33626->33625 33628 33b1284 CallWindowProcW 33627->33628 33629 33b42aa 33628->33629 33629->33622 33512 33b1cf0 33513 33b1d58 CreateWindowExW 33512->33513 33515 33b1e14 33513->33515 33640 173d5c8 DuplicateHandle 33641 173d65e 33640->33641 33516 8357bf9 33517 8357be4 33516->33517 33518 8357c03 33516->33518 33517->33518 33519 83589e0 12 API calls 33517->33519 33520 83589d0 12 API calls 33517->33520 33519->33518 33520->33518 33521 835aa78 33525 835aad0 33521->33525 33529 835aac0 33521->33529 33522 835aa96 33526 835aaf1 33525->33526 33527 835aafc 33525->33527 33526->33527 33533 835ab62 33526->33533 33527->33522 33530 835aac7 33529->33530 33531 835aafa 33529->33531 33530->33531 33532 835ab62 PostMessageW 33530->33532 33531->33522 33532->33531 33534 835ab9e 33533->33534 33535 835ab6b 33533->33535 33538 835a398 33534->33538 33535->33527 33540 835a3a3 33538->33540 33539 835abc1 33540->33539 33542 8356200 33540->33542 33543 8359ee0 PostMessageW 33542->33543 33544 8359f4c 33543->33544 33544->33539
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03882a93f38157efee2ef4860a0db04549b8a595583b54c235c02badd41bca9a
                                  • Instruction ID: 65358c39c1f92692b0db9bb7643f0fca5df13304b9cbb4265827c123defc6171
                                  • Opcode Fuzzy Hash: 03882a93f38157efee2ef4860a0db04549b8a595583b54c235c02badd41bca9a
                                  • Instruction Fuzzy Hash: 0D711B71D45219CFDB24CF66D840BEEBBBABFC9301F1091AAD80DA6651DB705A85CF40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6c97c811ec5800e5e56fcb3002029b5e748a03690714bdf2084663bc2f01d347
                                  • Instruction ID: a6d60ec1bce1e5169363b666bb0665bbebbf0ad907934605ffafa24ab3f98e36
                                  • Opcode Fuzzy Hash: 6c97c811ec5800e5e56fcb3002029b5e748a03690714bdf2084663bc2f01d347
                                  • Instruction Fuzzy Hash: 4C4129B4D09208CFDB04DFA6D545AEEBBB9AF89302F14A43AE81AA7651DB344442CF00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1a101204afdeb480c0c46697c46e1f9b9b26eadfed18c798bea854bce1b7d62a
                                  • Instruction ID: e7ecb59863f371c3f32afd32a79ec8f59e1b41ee25b3d1e402e4909949b30369
                                  • Opcode Fuzzy Hash: 1a101204afdeb480c0c46697c46e1f9b9b26eadfed18c798bea854bce1b7d62a
                                  • Instruction Fuzzy Hash: 3231C0B1D097588FDB59CF66885079ABFB7BFC5300F08C0AAD849AA265DB3409458F52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3af6e75bbf03c8fa6097ea95d7d76539868955bb38e62d9167460958299155a
                                  • Instruction ID: 404eaa9c909c56b56750d89ea037617e36d0263417841166ecf3d247a33f9653
                                  • Opcode Fuzzy Hash: d3af6e75bbf03c8fa6097ea95d7d76539868955bb38e62d9167460958299155a
                                  • Instruction Fuzzy Hash: A6217AB1E046188FEB58DF6BC81079EBAF7BFC9300F04D0BAD9496A254EB741A458F51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 294 173d371-173d378 295 173d334-173d36f 294->295 296 173d37a-173d40f GetCurrentProcess 294->296 304 173d411-173d417 296->304 305 173d418-173d44c GetCurrentThread 296->305 304->305 307 173d455-173d489 GetCurrentProcess 305->307 308 173d44e-173d454 305->308 311 173d492-173d4ad call 173d550 307->311 312 173d48b-173d491 307->312 308->307 315 173d4b3-173d4e2 GetCurrentThreadId 311->315 312->311 316 173d4e4-173d4ea 315->316 317 173d4eb-173d54d 315->317 316->317
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 0173D3FE
                                  • GetCurrentThread.KERNEL32 ref: 0173D43B
                                  • GetCurrentProcess.KERNEL32 ref: 0173D478
                                  • GetCurrentThreadId.KERNEL32 ref: 0173D4D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID: 4'eq
                                  • API String ID: 2063062207-1552367303
                                  • Opcode ID: 239523e6c015734d59ec2ac35e9e7756bb67c4e5a0a9de0827f3b3496f1bfb92
                                  • Instruction ID: 4d560100eb70217fe7d82710930aefe1484080549eae17e188fd052f17215518
                                  • Opcode Fuzzy Hash: 239523e6c015734d59ec2ac35e9e7756bb67c4e5a0a9de0827f3b3496f1bfb92
                                  • Instruction Fuzzy Hash: F16178B090130A8FDB14DFAAD988BDEFFF5EF98314F208059E409A7261D7346944CB61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 324 173d380-173d40f GetCurrentProcess 328 173d411-173d417 324->328 329 173d418-173d44c GetCurrentThread 324->329 328->329 330 173d455-173d489 GetCurrentProcess 329->330 331 173d44e-173d454 329->331 333 173d492-173d4ad call 173d550 330->333 334 173d48b-173d491 330->334 331->330 337 173d4b3-173d4e2 GetCurrentThreadId 333->337 334->333 338 173d4e4-173d4ea 337->338 339 173d4eb-173d54d 337->339 338->339
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 0173D3FE
                                  • GetCurrentThread.KERNEL32 ref: 0173D43B
                                  • GetCurrentProcess.KERNEL32 ref: 0173D478
                                  • GetCurrentThreadId.KERNEL32 ref: 0173D4D1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: bea554a6202f92b2c82f88aee808ec8d79e1766e217bd2d4da29d4ecdabad78d
                                  • Instruction ID: 50d5aeac97b9c548f3a51187ce9a252bd3f4b68c9d956b3ae2c9459351bfb0d4
                                  • Opcode Fuzzy Hash: bea554a6202f92b2c82f88aee808ec8d79e1766e217bd2d4da29d4ecdabad78d
                                  • Instruction Fuzzy Hash: D85145B49003098FDB24DFAAD988BDEFBF5EF88314F208059E409A7261D7346944CB65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2176 83577bd-835785d 2178 8357896-83578b6 2176->2178 2179 835785f-8357869 2176->2179 2186 83578ef-835791e 2178->2186 2187 83578b8-83578c2 2178->2187 2179->2178 2180 835786b-835786d 2179->2180 2181 8357890-8357893 2180->2181 2182 835786f-8357879 2180->2182 2181->2178 2184 835787d-835788c 2182->2184 2185 835787b 2182->2185 2184->2184 2188 835788e 2184->2188 2185->2184 2193 8357957-8357a11 CreateProcessA 2186->2193 2194 8357920-835792a 2186->2194 2187->2186 2189 83578c4-83578c6 2187->2189 2188->2181 2191 83578e9-83578ec 2189->2191 2192 83578c8-83578d2 2189->2192 2191->2186 2195 83578d4 2192->2195 2196 83578d6-83578e5 2192->2196 2207 8357a13-8357a19 2193->2207 2208 8357a1a-8357aa0 2193->2208 2194->2193 2197 835792c-835792e 2194->2197 2195->2196 2196->2196 2198 83578e7 2196->2198 2199 8357951-8357954 2197->2199 2200 8357930-835793a 2197->2200 2198->2191 2199->2193 2202 835793c 2200->2202 2203 835793e-835794d 2200->2203 2202->2203 2203->2203 2204 835794f 2203->2204 2204->2199 2207->2208 2218 8357ab0-8357ab4 2208->2218 2219 8357aa2-8357aa6 2208->2219 2221 8357ac4-8357ac8 2218->2221 2222 8357ab6-8357aba 2218->2222 2219->2218 2220 8357aa8 2219->2220 2220->2218 2224 8357ad8-8357adc 2221->2224 2225 8357aca-8357ace 2221->2225 2222->2221 2223 8357abc 2222->2223 2223->2221 2227 8357aee-8357af5 2224->2227 2228 8357ade-8357ae4 2224->2228 2225->2224 2226 8357ad0 2225->2226 2226->2224 2229 8357af7-8357b06 2227->2229 2230 8357b0c 2227->2230 2228->2227 2229->2230 2232 8357b0d 2230->2232 2232->2232
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 083579FE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 8374cdb1e012ee0cdf5cdc349b1054af74f517bedf2904d5aa39261af39f98e7
                                  • Instruction ID: c84f45a8a1d1768a712604c5944d3a79426138d44a777f6119297ba7afea85d0
                                  • Opcode Fuzzy Hash: 8374cdb1e012ee0cdf5cdc349b1054af74f517bedf2904d5aa39261af39f98e7
                                  • Instruction Fuzzy Hash: 2DA15C71D00619CFDB14CF68C841BEEBBB2FF88311F1485AAE819A7250DB749A85CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2233 83577c8-835785d 2235 8357896-83578b6 2233->2235 2236 835785f-8357869 2233->2236 2243 83578ef-835791e 2235->2243 2244 83578b8-83578c2 2235->2244 2236->2235 2237 835786b-835786d 2236->2237 2238 8357890-8357893 2237->2238 2239 835786f-8357879 2237->2239 2238->2235 2241 835787d-835788c 2239->2241 2242 835787b 2239->2242 2241->2241 2245 835788e 2241->2245 2242->2241 2250 8357957-8357a11 CreateProcessA 2243->2250 2251 8357920-835792a 2243->2251 2244->2243 2246 83578c4-83578c6 2244->2246 2245->2238 2248 83578e9-83578ec 2246->2248 2249 83578c8-83578d2 2246->2249 2248->2243 2252 83578d4 2249->2252 2253 83578d6-83578e5 2249->2253 2264 8357a13-8357a19 2250->2264 2265 8357a1a-8357aa0 2250->2265 2251->2250 2254 835792c-835792e 2251->2254 2252->2253 2253->2253 2255 83578e7 2253->2255 2256 8357951-8357954 2254->2256 2257 8357930-835793a 2254->2257 2255->2248 2256->2250 2259 835793c 2257->2259 2260 835793e-835794d 2257->2260 2259->2260 2260->2260 2261 835794f 2260->2261 2261->2256 2264->2265 2275 8357ab0-8357ab4 2265->2275 2276 8357aa2-8357aa6 2265->2276 2278 8357ac4-8357ac8 2275->2278 2279 8357ab6-8357aba 2275->2279 2276->2275 2277 8357aa8 2276->2277 2277->2275 2281 8357ad8-8357adc 2278->2281 2282 8357aca-8357ace 2278->2282 2279->2278 2280 8357abc 2279->2280 2280->2278 2284 8357aee-8357af5 2281->2284 2285 8357ade-8357ae4 2281->2285 2282->2281 2283 8357ad0 2282->2283 2283->2281 2286 8357af7-8357b06 2284->2286 2287 8357b0c 2284->2287 2285->2284 2286->2287 2289 8357b0d 2287->2289 2289->2289
                                  APIs
                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 083579FE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 082230fc49b98170891b974f79df82821ec8460081075a71f098e2ffd2200270
                                  • Instruction ID: 21bba8b9dc9bfb01d11fe7fd1e7a9c517c780f64c9391eedcf30a4a273e08f84
                                  • Opcode Fuzzy Hash: 082230fc49b98170891b974f79df82821ec8460081075a71f098e2ffd2200270
                                  • Instruction Fuzzy Hash: 75914C71D00619CFDB14DF68C841BEDBBB2BF88311F1481AAE819A7250DB749A85CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2290 173b0e8-173b0f7 2291 173b123-173b127 2290->2291 2292 173b0f9-173b106 call 173ada0 2290->2292 2293 173b13b-173b17c 2291->2293 2294 173b129-173b133 2291->2294 2299 173b108 2292->2299 2300 173b11c 2292->2300 2301 173b189-173b197 2293->2301 2302 173b17e-173b186 2293->2302 2294->2293 2346 173b10e call 173b370 2299->2346 2347 173b10e call 173b380 2299->2347 2300->2291 2303 173b1bb-173b1bd 2301->2303 2304 173b199-173b19e 2301->2304 2302->2301 2306 173b1c0-173b1c7 2303->2306 2307 173b1a0-173b1a7 call 173adac 2304->2307 2308 173b1a9 2304->2308 2305 173b114-173b116 2305->2300 2309 173b258-173b318 2305->2309 2310 173b1d4-173b1db 2306->2310 2311 173b1c9-173b1d1 2306->2311 2313 173b1ab-173b1b9 2307->2313 2308->2313 2341 173b320-173b34b GetModuleHandleW 2309->2341 2342 173b31a-173b31d 2309->2342 2314 173b1e8-173b1f1 call 173adbc 2310->2314 2315 173b1dd-173b1e5 2310->2315 2311->2310 2313->2306 2321 173b1f3-173b1fb 2314->2321 2322 173b1fe-173b203 2314->2322 2315->2314 2321->2322 2323 173b221-173b225 2322->2323 2324 173b205-173b20c 2322->2324 2348 173b228 call 173b670 2323->2348 2349 173b228 call 173b680 2323->2349 2324->2323 2326 173b20e-173b21e call 173adcc call 173addc 2324->2326 2326->2323 2327 173b22b-173b22e 2330 173b251-173b257 2327->2330 2331 173b230-173b24e 2327->2331 2331->2330 2343 173b354-173b368 2341->2343 2344 173b34d-173b353 2341->2344 2342->2341 2344->2343 2346->2305 2347->2305 2348->2327 2349->2327
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0173B33E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 619ebe1c5cdf995747889596b22d5ce5be530aeb1a649c411b0caed9c4362011
                                  • Instruction ID: ce6ae429ebedfc7373fe78a804f79b37e4aeea13e5b342b73fcac88a4529e627
                                  • Opcode Fuzzy Hash: 619ebe1c5cdf995747889596b22d5ce5be530aeb1a649c411b0caed9c4362011
                                  • Instruction Fuzzy Hash: EF7121B0A00B098FDB24DF6AD44575ABBF5FF88300F008A2ED48ADBA55D774E9458B90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2350 33b1ce4-33b1d56 2352 33b1d58-33b1d5e 2350->2352 2353 33b1d61-33b1d68 2350->2353 2352->2353 2354 33b1d6a-33b1d70 2353->2354 2355 33b1d73-33b1dab 2353->2355 2354->2355 2356 33b1db3-33b1e12 CreateWindowExW 2355->2356 2357 33b1e1b-33b1e53 2356->2357 2358 33b1e14-33b1e1a 2356->2358 2362 33b1e60 2357->2362 2363 33b1e55-33b1e58 2357->2363 2358->2357 2364 33b1e61 2362->2364 2363->2362 2364->2364
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 033B1E02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2062484786.00000000033B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_33b0000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: cf93f9dc977f081a1cad425c2ec530ec0666731746b228481be322023070948f
                                  • Instruction ID: 7413ef18c4ad33bedb4d550944672a9d87186649982a8ac5f53e82a301be50bb
                                  • Opcode Fuzzy Hash: cf93f9dc977f081a1cad425c2ec530ec0666731746b228481be322023070948f
                                  • Instruction Fuzzy Hash: BD51C1B1D10309AFDB14CF99C984ADEFBB6BF88310F64812AE819AB210D7759945CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2365 33b1cf0-33b1d56 2366 33b1d58-33b1d5e 2365->2366 2367 33b1d61-33b1d68 2365->2367 2366->2367 2368 33b1d6a-33b1d70 2367->2368 2369 33b1d73-33b1e12 CreateWindowExW 2367->2369 2368->2369 2371 33b1e1b-33b1e53 2369->2371 2372 33b1e14-33b1e1a 2369->2372 2376 33b1e60 2371->2376 2377 33b1e55-33b1e58 2371->2377 2372->2371 2378 33b1e61 2376->2378 2377->2376 2378->2378
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 033B1E02
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2062484786.00000000033B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_33b0000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 0aa7ed7e7fcd4e6f489f6058369fcf6835fc924f7fbcd8d1407330fbdc018673
                                  • Instruction ID: c6a51d74b6f5767e775b1b5b76b4034c56979352e4ed6ac140c704f1af53f2dd
                                  • Opcode Fuzzy Hash: 0aa7ed7e7fcd4e6f489f6058369fcf6835fc924f7fbcd8d1407330fbdc018673
                                  • Instruction Fuzzy Hash: B141CFB1D103099FDB14CF9AC994ADEFBB6BF88310F64812AE919AB210D7749945CF90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2489 173590c-1735916 2490 1735918-17359d9 CreateActCtxA 2489->2490 2492 17359e2-1735a3c 2490->2492 2493 17359db-17359e1 2490->2493 2500 1735a4b-1735a4f 2492->2500 2501 1735a3e-1735a41 2492->2501 2493->2492 2502 1735a51-1735a5d 2500->2502 2503 1735a60 2500->2503 2501->2500 2502->2503 2505 1735a61 2503->2505 2505->2505
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 017359C9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 786ed826b0761abb32f8d2444d0e8991b81793c32e63a98ff4e1cdec1233e6db
                                  • Instruction ID: 5929bee690f965cf337263116c4984b37992086098b616a0f7ea733f7520b9d1
                                  • Opcode Fuzzy Hash: 786ed826b0761abb32f8d2444d0e8991b81793c32e63a98ff4e1cdec1233e6db
                                  • Instruction Fuzzy Hash: B941CFB0C00719CFDB24CFA9C884A9DBFF5BF89304F20816AD508AB252DB75694ACF51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2506 33b1284-33b42fc 2509 33b43ac-33b43cc call 33b115c 2506->2509 2510 33b4302-33b4307 2506->2510 2517 33b43cf-33b43dc 2509->2517 2511 33b435a-33b4392 CallWindowProcW 2510->2511 2512 33b4309-33b4340 2510->2512 2514 33b439b-33b43aa 2511->2514 2515 33b4394-33b439a 2511->2515 2520 33b4349-33b4358 2512->2520 2521 33b4342-33b4348 2512->2521 2514->2517 2515->2514 2520->2517 2521->2520
                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 033B4381
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2062484786.00000000033B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_33b0000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: c0ad5812e97ec24438635004b485c8ebf7b179b82cd4e52d758962853d611c16
                                  • Instruction ID: 510684b5226a1c1792c061b2f0bbe36c0b4c0525b41d228b196d6341c4244a91
                                  • Opcode Fuzzy Hash: c0ad5812e97ec24438635004b485c8ebf7b179b82cd4e52d758962853d611c16
                                  • Instruction Fuzzy Hash: B3412BB9900305CFDB14CF9AC888AAAFBF5FF88314F28C459D519A7721D334A941CBA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2523 1734514-17359d9 CreateActCtxA 2526 17359e2-1735a3c 2523->2526 2527 17359db-17359e1 2523->2527 2534 1735a4b-1735a4f 2526->2534 2535 1735a3e-1735a41 2526->2535 2527->2526 2536 1735a51-1735a5d 2534->2536 2537 1735a60 2534->2537 2535->2534 2536->2537 2539 1735a61 2537->2539 2539->2539
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 017359C9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 6e47c22d9b58ad6139cd6f214142b0b50431baca32ca6fb0029462b1b5260d18
                                  • Instruction ID: 78a45894f936b554fb96265d6317ad95562fc518fb5b2de937d586a87f69916d
                                  • Opcode Fuzzy Hash: 6e47c22d9b58ad6139cd6f214142b0b50431baca32ca6fb0029462b1b5260d18
                                  • Instruction Fuzzy Hash: 9E41B0B0C0071DCBDB24DFA9C884A9DFBF5BF89304F20816AD509AB256DB756949CF90
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 083575D0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 0f13dc8993ab7e9c1fccf7c0f9490a0e05c6b609f9ed65de891c133f7db1cde4
                                  • Instruction ID: 8bcfebb1716c6b5daa7fe394b341c7a985da2ef9838e2d5de33fef95db6dcd0e
                                  • Opcode Fuzzy Hash: 0f13dc8993ab7e9c1fccf7c0f9490a0e05c6b609f9ed65de891c133f7db1cde4
                                  • Instruction Fuzzy Hash: 9C2128759003099FDB10CFA9C885BEEBBF5FF88320F10842AE919A7250D7789954DBA4
                                  APIs
                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 083575D0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 7702f65260cdd452d4585ff84b0575f3758e118d959e60437ce4b6f866f4e1f2
                                  • Instruction ID: ecdad0e2fe1ad77ff77bc4aec62c76e32ba7c333e39142c9bee628dcdb333df2
                                  • Opcode Fuzzy Hash: 7702f65260cdd452d4585ff84b0575f3758e118d959e60437ce4b6f866f4e1f2
                                  • Instruction Fuzzy Hash: A2213B759003099FDB10CFA9C885BEEBBF5FF48310F108429E919A7240D7789954DBA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 57f4e10fff5b1556d018f7eb34e1c54e5f16d64f52fed61ea853c7e878ff0fde
                                  • Instruction ID: 56d7467699b1f0210e64bfcffab87c2bbba53c39a0d6cb9267b857e082307f59
                                  • Opcode Fuzzy Hash: 57f4e10fff5b1556d018f7eb34e1c54e5f16d64f52fed61ea853c7e878ff0fde
                                  • Instruction Fuzzy Hash: 3421CD71A05258CFDB21DF68E404BEEBFB0AF89312F14805ADC45B7240CB356900CBA0
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08357426
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 86075dbb6002a488dff65dd8cb37808b2ef068b5073429d139aa4f8fee1acdad
                                  • Instruction ID: 9d4f5f68bf7d4f3d1605926b0f69ddf6b4e4ca68ad7fa940ee64b04ff09b449a
                                  • Opcode Fuzzy Hash: 86075dbb6002a488dff65dd8cb37808b2ef068b5073429d139aa4f8fee1acdad
                                  • Instruction Fuzzy Hash: 85213C719002098FDB10DFAAC885BAEBFF5EF88320F54842ED419A7241C7789545CFA0
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 083576B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 731cbdcbc017cd53a81672a27cc0f14732ac0d1ead324415ed96b0e4ecf9d8dc
                                  • Instruction ID: 6123ad700d6bc9eccbe448b9b90607148f776d1cc50a6ad0a9d5ab8ac329355f
                                  • Opcode Fuzzy Hash: 731cbdcbc017cd53a81672a27cc0f14732ac0d1ead324415ed96b0e4ecf9d8dc
                                  • Instruction Fuzzy Hash: 4E2136719003499FDB10DFA9C880AEEBBF5FF88320F14842AE919A7251C7389544DBA0
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0173D64F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: c590c707e486f933ba61658b1e53776315ff365a40e97a714b288c303417ff32
                                  • Instruction ID: da7c6f0b7a85ad31af73a8e67b299976b40b0c510cc7c31ecefb99f646a34576
                                  • Opcode Fuzzy Hash: c590c707e486f933ba61658b1e53776315ff365a40e97a714b288c303417ff32
                                  • Instruction Fuzzy Hash: 9721E5B5900349AFDB10CFAAD984ADEFBF5EB48320F14841AE918A3351D374A954DF64
                                  APIs
                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 083576B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: c6313252df464740dd52f8fa54c8572360ed8ae063073332332f1e0aae485ac1
                                  • Instruction ID: 29b8783d0849788d15c0e4849e5f6c2122153aac05582da4207830f200df27e3
                                  • Opcode Fuzzy Hash: c6313252df464740dd52f8fa54c8572360ed8ae063073332332f1e0aae485ac1
                                  • Instruction Fuzzy Hash: 6D213971C003499FDB10DFAAC884AEEFBF5FF48320F10842AE919A7250D7389940DBA4
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 08357426
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 6aa3bc688d30150443a984afb565d4d5fb1a471817195d238c9c0d42460f6d4a
                                  • Instruction ID: d99f72e6e93a59833feafea5a362b2c6cfc4f370113368a36f0bea748fd4f295
                                  • Opcode Fuzzy Hash: 6aa3bc688d30150443a984afb565d4d5fb1a471817195d238c9c0d42460f6d4a
                                  • Instruction Fuzzy Hash: 422109719003098FDB10DFAAC885BAEBFF5EF88320F548429D519A7241DB789945CBA4
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0173D64F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 9995173116537298308f124f00fe90e9b24a5b86fb85ad784ba0366c86013758
                                  • Instruction ID: 226ec4c68a42b235444c341078af4fff5bb21d978dfc2246ff1439db699a4af1
                                  • Opcode Fuzzy Hash: 9995173116537298308f124f00fe90e9b24a5b86fb85ad784ba0366c86013758
                                  • Instruction Fuzzy Hash: 4321E4B5900208DFDB10CF9AD984ADEFFF9EB48320F14801AE918A3310D378A944DFA4
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 083574EE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: f6d49ec2563bfd4bfb29826ed8abd11ecce88afd14de8ef91399bc4abb421eb7
                                  • Instruction ID: 757592e0e8d692905f97a2837418948fd21539a47739c367c2e5ad0d82c84874
                                  • Opcode Fuzzy Hash: f6d49ec2563bfd4bfb29826ed8abd11ecce88afd14de8ef91399bc4abb421eb7
                                  • Instruction Fuzzy Hash: 922159718002499FDB11DFAAC844BEFBFF5EF89320F148419E915A7250CB75A940DFA0
                                  APIs
                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 083574EE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: ece03c2944dafb2f7670e48999f6771038a7772e75b899e7b7c9f46b2239fb2f
                                  • Instruction ID: a74ef9058e8a6b21598f30b6f9a389b76d527b3b4a19b66ccb7ad503600dc853
                                  • Opcode Fuzzy Hash: ece03c2944dafb2f7670e48999f6771038a7772e75b899e7b7c9f46b2239fb2f
                                  • Instruction Fuzzy Hash: CC1137769002499FDB10DFAAC844AEFBFF5EF88320F148419E919A7250CB759940DFA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: d42d25bbf697cf42887ff6fe8eaf0800bcbf5aae041862e4737527872f7c30c7
                                  • Instruction ID: ea24fe8b42b34511d16036ed6baea281b73b76066eca5f0d46b30979fca385d1
                                  • Opcode Fuzzy Hash: d42d25bbf697cf42887ff6fe8eaf0800bcbf5aae041862e4737527872f7c30c7
                                  • Instruction Fuzzy Hash: 121116B59002498FDB24DFAAC945BEFFBF5EF88324F14841AD419A7250CB396944CFA4
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: cd7fb22b9acef7952b5a069aca66764c01d8199b7072cb907fdf73d0a7e2679f
                                  • Instruction ID: 067ba3753d6497489c1a92fca9bb7739420a89925d6fbef0d3db547a6ce433f1
                                  • Opcode Fuzzy Hash: cd7fb22b9acef7952b5a069aca66764c01d8199b7072cb907fdf73d0a7e2679f
                                  • Instruction Fuzzy Hash: 261128719003498BDB20DFAAC8457AEFBF5EF88324F148419D519A7240CA756944CBA4
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 08359F3D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 66dcf66d24e88f0692b1b37f456a1f41488b1292ede066c9e458b491e205aa14
                                  • Instruction ID: a031056b155641439f987f4945ca7512a35f0571714f8c0300921962780ed89a
                                  • Opcode Fuzzy Hash: 66dcf66d24e88f0692b1b37f456a1f41488b1292ede066c9e458b491e205aa14
                                  • Instruction Fuzzy Hash: CC11F2B5804349DFDB10DF9AD885BEEBFF8EB48320F10841AE918A7200C375A944CFA1
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0173B33E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 9e67b70beb8f2acf7356599c7a17f46a1124a2ba216caed984083280cb3f9196
                                  • Instruction ID: dc15b2d334915b7db232d353410dfe1f503bc7454ce194e9aeeda45665bd0cbe
                                  • Opcode Fuzzy Hash: 9e67b70beb8f2acf7356599c7a17f46a1124a2ba216caed984083280cb3f9196
                                  • Instruction Fuzzy Hash: 3E11F2B6C003598FDB14CF9AD844ADEFBF4EF88324F14842AD919A7211D379A545CFA1
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 08359F3D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 24e8d68918e283a03c4d1c64ba4a713c001363a9fe3c19958168fd5031bcc1a6
                                  • Instruction ID: 73d01cf4ebb6ace82437392593fbedc85022f3222dc71d7e1a54fdf95e2e1e44
                                  • Opcode Fuzzy Hash: 24e8d68918e283a03c4d1c64ba4a713c001363a9fe3c19958168fd5031bcc1a6
                                  • Instruction Fuzzy Hash: 6811C2B5800249DFDB20DF99D985BEEFFF4EB88320F10845AE959A7250C375A944CFA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060558628.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_145d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6894164d69d5f8dbd49041219a46bf2512e2fa04d96543803a0085897fbd8eb7
                                  • Instruction ID: 5c69044ec2a1f98b3c0af2e7b570e9352d8fd3a800f8eec73df248859bcd5021
                                  • Opcode Fuzzy Hash: 6894164d69d5f8dbd49041219a46bf2512e2fa04d96543803a0085897fbd8eb7
                                  • Instruction Fuzzy Hash: BA21F471904244DFDB46DF58D980B27BF65FF88328F24C56ADD050A267C336D456C6A1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060558628.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_145d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 366effe6c657bb30c9f1ead7c03649cd39c070566c3b99e914750171d8f41d32
                                  • Instruction ID: c231fb827b5933aa70cb79541591bab96307b214047cc04ecd933b96a8d7fd3a
                                  • Opcode Fuzzy Hash: 366effe6c657bb30c9f1ead7c03649cd39c070566c3b99e914750171d8f41d32
                                  • Instruction Fuzzy Hash: DA210271904200DFDB05DF48C980B66BF65EF89324F20C56ADD090A26BC33AE446CAA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060618837.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_146d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 766f6bfecd3de65376ca65e08376be9cc935128eebde4867542e2b41812e4798
                                  • Instruction ID: 34a6fe7f4679c00326a8b6ea208caada06125a43a99f88408177ce125313d7f2
                                  • Opcode Fuzzy Hash: 766f6bfecd3de65376ca65e08376be9cc935128eebde4867542e2b41812e4798
                                  • Instruction Fuzzy Hash: 9B213E71B04200DFDB05DF98D9C0B26BB69FB84328F24C56ED9494B366C336D446CB62
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060618837.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_146d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7619be5883a51ef6be61d42ef1b083b6544d75191d05bfbb2faa176544715ad5
                                  • Instruction ID: 5ac4bfc95cc19bc031d01f9cfcbfe40c4f2d2fb4cf890c470b3a652702f3bb3e
                                  • Opcode Fuzzy Hash: 7619be5883a51ef6be61d42ef1b083b6544d75191d05bfbb2faa176544715ad5
                                  • Instruction Fuzzy Hash: 2B2128B5A04200DFCB15DF58D980B16BB69EB8431CF24C56ED9490B366C337D407C662
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060618837.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_146d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd0cb3cc21dd616cbfb381e55b621e85e82d5e938a4aa6afac1bc0b915a2e2f8
                                  • Instruction ID: e7546dbda76c81f51496682e0f8b1f8eaf4bfddd767a37e7884872d6c61dc0ac
                                  • Opcode Fuzzy Hash: dd0cb3cc21dd616cbfb381e55b621e85e82d5e938a4aa6afac1bc0b915a2e2f8
                                  • Instruction Fuzzy Hash: 082180755093808FDB03CF24D594716BF71EF46218F28C5DBD8898B2A7C33A980ACB62
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060558628.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_145d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                  • Instruction ID: 727d4100124902042049fad8cf8b5a95f11f1121fbd67e5baf0d4e827393b54e
                                  • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                  • Instruction Fuzzy Hash: 5311CD76804240CFDB06CF44D9C4B56BF62FF85324F24C2AADD090A267C33AE45ACBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060558628.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_145d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                  • Instruction ID: 8bd719fed8cb28d4ad4066fb94c0dfc01dc08c305b7c8f77b401c69d0df8e3e5
                                  • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                  • Instruction Fuzzy Hash: 3A11CD76804284CFCB02CF54D9C4B16BF61FB84328F24C6AADC090B267C33AD45ACBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060618837.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_146d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                  • Instruction ID: 584d9f5d288f0a156cf8de7b5afbf8be0ce2f3d44fdbbc732ca0dd5fb671f8ce
                                  • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                  • Instruction Fuzzy Hash: 9E118E75A04240DFDB16CF54D5C4B16BB61FB84328F28C6AED8494B766C33AD44ACB52
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060558628.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_145d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43240f326e8d109f83637788ab303d7c911dc26b93399f366fda3511e6db9746
                                  • Instruction ID: 6d35b22a65e62baac859058c45706063c15a7dbcc02bd285cfc93a911c4779d1
                                  • Opcode Fuzzy Hash: 43240f326e8d109f83637788ab303d7c911dc26b93399f366fda3511e6db9746
                                  • Instruction Fuzzy Hash: 6A0126718043809BE7619FA9CDC4B27BFA8DF41370F18C52BED080A397D2399841CAB1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2060558628.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_145d000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c86e884e914326abd96976aceb1af35d3de81c4e8fd7d44a2450b074f997a9a
                                  • Instruction ID: 8ac1c7eccb35540f457c73ec9d6516427c024b68f1ae8a2cec5a6958a13d59e5
                                  • Opcode Fuzzy Hash: 8c86e884e914326abd96976aceb1af35d3de81c4e8fd7d44a2450b074f997a9a
                                  • Instruction Fuzzy Hash: 48F0C2764043809FE7118E1AC988B63FF98EF81234F18C05BED080A397D2799840CAB0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 098fbdca1fa254bb09ce9526b59cb62e895b4d89b39a42ad55fba96fec01fb06
                                  • Instruction ID: 643c2230e01ac0332df61c1814038273c8f91838accb0ac48555e0b3f79635ae
                                  • Opcode Fuzzy Hash: 098fbdca1fa254bb09ce9526b59cb62e895b4d89b39a42ad55fba96fec01fb06
                                  • Instruction Fuzzy Hash: B0D19A30701A158FDB29EF7AC460B6AB7E6AFC8712F14846DD54ACB3A5CB35E901CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be7b95fda8bc1d64c966b69ead7e5934efb0d27b0cb2c958dd8a8874f2301dc3
                                  • Instruction ID: 92172502d1a39fcc8a676073bcca745da4e8af61e8bfe4c83b04127dec1b5e43
                                  • Opcode Fuzzy Hash: be7b95fda8bc1d64c966b69ead7e5934efb0d27b0cb2c958dd8a8874f2301dc3
                                  • Instruction Fuzzy Hash: 63E119B4E051198FDB14DFA8C9809AEFBB2FF89305F24816AD815AB355D734AD41CFA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2062484786.00000000033B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_33b0000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3aa8c8f5cf3945d99a0a6f86beb5394e17e48b7b727aa4c6f5b96fd7ab0586ef
                                  • Instruction ID: e1c8a1411b4ff948361f4e70807df7bfeced6b4037de3506074c73cdbc9675ef
                                  • Opcode Fuzzy Hash: 3aa8c8f5cf3945d99a0a6f86beb5394e17e48b7b727aa4c6f5b96fd7ab0586ef
                                  • Instruction Fuzzy Hash: 5F1271F8C01746CAE734CF65E94C1993BB1BBA5398B904309D2A16A2FDDBB8154BCF44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d8c7c68ea7803e7c999cdc717b84932be3c00855ea498621bc9e1018ba65653
                                  • Instruction ID: a5c0a7bb33ebfef51b9ad7dbaa2de6d84f801a93b21502cc24b7f4284d715ea4
                                  • Opcode Fuzzy Hash: 7d8c7c68ea7803e7c999cdc717b84932be3c00855ea498621bc9e1018ba65653
                                  • Instruction Fuzzy Hash: DAE108B4E011198FDB14DFA9C9809AEFBB2FF89305F24816AD814AB355D735AD81CF60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 575a9dc70b4349503a0562324c6f906b948de151a73dacbc9a255373a025cdd0
                                  • Instruction ID: 1275830a44e90bc45048336c178ee70a021336641c531a0f2fa4276e00d52ec8
                                  • Opcode Fuzzy Hash: 575a9dc70b4349503a0562324c6f906b948de151a73dacbc9a255373a025cdd0
                                  • Instruction Fuzzy Hash: D3E108B4E051199FDB14DFA8C9809AEFBB2FF88305F24816AD814AB355D734AD81CF64
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 72ce3d7c6071c863ed83f76d90c3d50a18b0d7e63f7dcf3672e93f0af23a281a
                                  • Instruction ID: ff49758c9feea6e863230d48b664d1ba38c90190c12865a5af93a0630778c7d4
                                  • Opcode Fuzzy Hash: 72ce3d7c6071c863ed83f76d90c3d50a18b0d7e63f7dcf3672e93f0af23a281a
                                  • Instruction Fuzzy Hash: 97E106B4E051198FDB14DFA9C9819AEFBB2FF88305F64816AD814AB315D734AD41CFA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a71aa1817e30eecd83dd6e8b891f42fdf330ba888fb52526207d716a29a94223
                                  • Instruction ID: 8d6f766a5162ca8b2e044ffe6a2669cb7ad2db06e4a6168781cd40394c15bdc2
                                  • Opcode Fuzzy Hash: a71aa1817e30eecd83dd6e8b891f42fdf330ba888fb52526207d716a29a94223
                                  • Instruction Fuzzy Hash: 3BE106B4E051198FDB14DFA9C9809AEFBB6FF88305F24816AD814AB355D734AD41CFA0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2061603639.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1730000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ec23b5e634e9e0cdc9940887769286b980069a0a147f3dfa138b3728df90ad6b
                                  • Instruction ID: 575186be7064831f64e02b799c07bcc32881ef206692038f218b1c944750aeaf
                                  • Opcode Fuzzy Hash: ec23b5e634e9e0cdc9940887769286b980069a0a147f3dfa138b3728df90ad6b
                                  • Instruction Fuzzy Hash: B1A15D36E0021A8FCF15DFB4C88459EFBB2FFC5300B65456AE915AB266DB31E916CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2062484786.00000000033B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 033B0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_33b0000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4afbc0139d8dfa230d0c956d18345243659f2db0ed0a2726c53a78531696f089
                                  • Instruction ID: a34315c79057f5b0b70f69350db9dfc50c12b7eb37addc3ab9c2c13b4d9077ab
                                  • Opcode Fuzzy Hash: 4afbc0139d8dfa230d0c956d18345243659f2db0ed0a2726c53a78531696f089
                                  • Instruction Fuzzy Hash: 4AD1F3B8C01746CFD721CF69E9481993BB1BBA63A4B544309D2A16B2FDDBB8144BCF44
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5242e9dea00cf34ac6b803121b46cef17ffec24dfc12f4666d520b189a13c3cb
                                  • Instruction ID: c08327fb9d82a9ee5ea96ae5d5fa821d6ada44ba84301573d6a321dccda28f0a
                                  • Opcode Fuzzy Hash: 5242e9dea00cf34ac6b803121b46cef17ffec24dfc12f4666d520b189a13c3cb
                                  • Instruction Fuzzy Hash: 83513B70E052198FDB14CFA9C9819AEFBF6FF89305F24C16AD818AB215D735A941CF60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d9bb3898b2efd380ee89ea7cdb2634e28ecd29b2ad82d7e0e4d0f72b7f5b6225
                                  • Instruction ID: dee17a09d5e2fbabbe15f53249e56368d622996d2b432e5a75d85465154ec6c8
                                  • Opcode Fuzzy Hash: d9bb3898b2efd380ee89ea7cdb2634e28ecd29b2ad82d7e0e4d0f72b7f5b6225
                                  • Instruction Fuzzy Hash: 82512C74E052598FDB14CFA9C9809AEFBF2FF89305F24C16AD818AB215D734A941CF60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065765451.0000000008350000.00000040.00000800.00020000.00000000.sdmp, Offset: 08350000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_8350000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a42d407e4f81cf10feaaff4252e6ade9f7321a53232bbbbb0cc99a79188a7f26
                                  • Instruction ID: e53ce0e3e65aa6bf5a6744a9c933d8c0bbe50231df5972b54f16bbf96bfc8e6f
                                  • Opcode Fuzzy Hash: a42d407e4f81cf10feaaff4252e6ade9f7321a53232bbbbb0cc99a79188a7f26
                                  • Instruction Fuzzy Hash: 1031BBB1D056288BEB18CF57D8147DEFAF6AFC9305F14D0BAC40CAA255DB740A898F50

                                  Execution Graph

                                  Execution Coverage:1.4%
                                  Dynamic/Decrypted Code Coverage:2.7%
                                  Signature Coverage:5.8%
                                  Total number of Nodes:549
                                  Total number of Limit Nodes:69
                                  execution_graph 100043 1902ad0 LdrInitializeThunk 100047 41f0d0 100050 41b930 100047->100050 100051 41b956 100050->100051 100058 409d30 100051->100058 100053 41b962 100054 41b983 100053->100054 100066 40c1b0 100053->100066 100056 41b975 100102 41a670 100056->100102 100059 409d3d 100058->100059 100105 409c80 100058->100105 100061 409d44 100059->100061 100117 409c20 100059->100117 100061->100053 100067 40c1d5 100066->100067 100529 40b1b0 100067->100529 100069 40c22c 100533 40ae30 100069->100533 100071 40c4a3 100071->100056 100072 40c252 100072->100071 100542 414390 100072->100542 100074 40c297 100074->100071 100545 408a60 100074->100545 100076 40c2db 100076->100071 100552 41a4c0 100076->100552 100080 40c331 100081 40c338 100080->100081 100564 419fd0 100080->100564 100083 41bd80 2 API calls 100081->100083 100085 40c345 100083->100085 100085->100056 100086 40c382 100087 41bd80 2 API calls 100086->100087 100088 40c389 100087->100088 100088->100056 100089 40c392 100090 40f490 3 API calls 100089->100090 100091 40c406 100090->100091 100091->100081 100092 40c411 100091->100092 100093 41bd80 2 API calls 100092->100093 100094 40c435 100093->100094 100569 41a020 100094->100569 100097 419fd0 2 API calls 100098 40c470 100097->100098 100098->100071 100574 419de0 100098->100574 100101 41a670 2 API calls 100101->100071 100103 41a68f ExitProcess 100102->100103 100104 41af20 LdrLoadDll 100102->100104 100104->100103 100136 418b80 100105->100136 100109 409ca6 100109->100059 100110 409c9c 100110->100109 100143 41b270 100110->100143 100112 409ce3 100112->100109 100154 409aa0 100112->100154 100114 409d03 100160 409620 LdrLoadDll 100114->100160 100116 409d15 100116->100059 100118 409c3a 100117->100118 100119 41b560 LdrLoadDll 100117->100119 100503 41b560 100118->100503 100119->100118 100122 41b560 LdrLoadDll 100123 409c61 100122->100123 100124 40f170 100123->100124 100125 40f189 100124->100125 100511 40b030 100125->100511 100127 40f19c 100515 41a1a0 100127->100515 100131 40f1c2 100132 40f1ed 100131->100132 100522 41a220 100131->100522 100133 41a450 2 API calls 100132->100133 100135 409d55 100133->100135 100135->100053 100137 418b8f 100136->100137 100161 414e40 100137->100161 100139 409c93 100140 418a30 100139->100140 100167 41a5c0 100140->100167 100144 41b289 100143->100144 100174 414a40 100144->100174 100146 41b2a1 100147 41b2aa 100146->100147 100213 41b0b0 100146->100213 100147->100112 100149 41b2be 100149->100147 100231 419ec0 100149->100231 100481 407ea0 100154->100481 100156 409ac1 100156->100114 100157 409aba 100157->100156 100494 408160 100157->100494 100160->100116 100162 414e4e 100161->100162 100164 414e5a 100161->100164 100162->100164 100166 4152c0 LdrLoadDll 100162->100166 100164->100139 100165 414fac 100165->100139 100166->100165 100170 41af20 100167->100170 100169 418a45 100169->100110 100171 41af30 100170->100171 100173 41af52 100170->100173 100172 414e40 LdrLoadDll 100171->100172 100172->100173 100173->100169 100175 414d75 100174->100175 100185 414a54 100174->100185 100175->100146 100178 414b6d 100178->100146 100179 414b80 100242 41a320 100179->100242 100180 414b63 100299 41a420 LdrLoadDll 100180->100299 100183 414ba7 100184 41bd80 2 API calls 100183->100184 100187 414bb3 100184->100187 100185->100175 100239 419c10 100185->100239 100186 414d39 100189 41a450 2 API calls 100186->100189 100187->100178 100187->100186 100188 414d4f 100187->100188 100193 414c42 100187->100193 100308 414780 LdrLoadDll NtReadFile NtClose 100188->100308 100190 414d40 100189->100190 100190->100146 100192 414d62 100192->100146 100194 414ca9 100193->100194 100196 414c51 100193->100196 100194->100186 100195 414cbc 100194->100195 100301 41a2a0 100195->100301 100198 414c56 100196->100198 100199 414c6a 100196->100199 100300 414640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 100198->100300 100201 414c87 100199->100201 100202 414c6f 100199->100202 100201->100190 100257 414400 100201->100257 100245 4146e0 100202->100245 100204 414c60 100204->100146 100207 414d1c 100305 41a450 100207->100305 100208 414c7d 100208->100146 100211 414c9f 100211->100146 100212 414d28 100212->100146 100214 41b0c1 100213->100214 100215 41b0d3 100214->100215 100326 41bd00 100214->100326 100215->100149 100217 41b0f4 100329 414060 100217->100329 100219 41b140 100219->100149 100220 41b117 100220->100219 100221 414060 3 API calls 100220->100221 100223 41b139 100221->100223 100223->100219 100354 415380 100223->100354 100224 41b1ca 100225 41b1da 100224->100225 100448 41aec0 LdrLoadDll 100224->100448 100364 41ad30 100225->100364 100228 41b208 100443 419e80 100228->100443 100232 41af20 LdrLoadDll 100231->100232 100233 419edc 100232->100233 100475 1902c0a 100233->100475 100234 419ef7 100236 41bd80 100234->100236 100478 41a630 100236->100478 100238 41b319 100238->100112 100240 41af20 LdrLoadDll 100239->100240 100241 414b34 100240->100241 100241->100178 100241->100179 100241->100180 100243 41af20 LdrLoadDll 100242->100243 100244 41a33c NtCreateFile 100243->100244 100244->100183 100246 4146fc 100245->100246 100247 41a2a0 LdrLoadDll 100246->100247 100248 41471d 100247->100248 100249 414724 100248->100249 100250 414738 100248->100250 100252 41a450 2 API calls 100249->100252 100251 41a450 2 API calls 100250->100251 100253 414741 100251->100253 100254 41472d 100252->100254 100309 41bf90 LdrLoadDll RtlAllocateHeap 100253->100309 100254->100208 100256 41474c 100256->100208 100258 41444b 100257->100258 100259 41447e 100257->100259 100261 41a2a0 LdrLoadDll 100258->100261 100260 4145c9 100259->100260 100264 41449a 100259->100264 100262 41a2a0 LdrLoadDll 100260->100262 100263 414466 100261->100263 100269 4145e4 100262->100269 100265 41a450 2 API calls 100263->100265 100266 41a2a0 LdrLoadDll 100264->100266 100267 41446f 100265->100267 100268 4144b5 100266->100268 100267->100211 100271 4144d1 100268->100271 100272 4144bc 100268->100272 100322 41a2e0 LdrLoadDll 100269->100322 100273 4144d6 100271->100273 100274 4144ec 100271->100274 100276 41a450 2 API calls 100272->100276 100277 41a450 2 API calls 100273->100277 100285 4144f1 100274->100285 100310 41bf50 100274->100310 100275 41461e 100278 41a450 2 API calls 100275->100278 100279 4144c5 100276->100279 100280 4144df 100277->100280 100282 414629 100278->100282 100279->100211 100280->100211 100281 414503 100281->100211 100282->100211 100285->100281 100313 41a3d0 100285->100313 100286 414557 100290 41456e 100286->100290 100321 41a260 LdrLoadDll 100286->100321 100288 414575 100291 41a450 2 API calls 100288->100291 100289 41458a 100292 41a450 2 API calls 100289->100292 100290->100288 100290->100289 100291->100281 100293 414593 100292->100293 100294 4145bf 100293->100294 100316 41bb50 100293->100316 100294->100211 100296 4145aa 100297 41bd80 2 API calls 100296->100297 100298 4145b3 100297->100298 100298->100211 100299->100178 100300->100204 100302 41af20 LdrLoadDll 100301->100302 100303 414d04 100301->100303 100302->100303 100304 41a2e0 LdrLoadDll 100303->100304 100304->100207 100306 41a46c NtClose 100305->100306 100307 41af20 LdrLoadDll 100305->100307 100306->100212 100307->100306 100308->100192 100309->100256 100323 41a5f0 100310->100323 100312 41bf68 100312->100285 100314 41af20 LdrLoadDll 100313->100314 100315 41a3ec NtReadFile 100314->100315 100315->100286 100317 41bb74 100316->100317 100318 41bb5d 100316->100318 100317->100296 100318->100317 100319 41bf50 2 API calls 100318->100319 100320 41bb8b 100319->100320 100320->100296 100321->100290 100322->100275 100324 41af20 LdrLoadDll 100323->100324 100325 41a60c RtlAllocateHeap 100324->100325 100325->100312 100327 41bd2d 100326->100327 100449 41a500 100326->100449 100327->100217 100330 414071 100329->100330 100332 414079 100329->100332 100330->100220 100331 41434c 100331->100220 100332->100331 100452 41cef0 100332->100452 100334 4140cd 100335 41cef0 2 API calls 100334->100335 100339 4140d8 100335->100339 100336 414126 100338 41cef0 2 API calls 100336->100338 100340 41413a 100338->100340 100339->100336 100457 41cf90 100339->100457 100341 41cef0 2 API calls 100340->100341 100343 4141ad 100341->100343 100342 41cef0 2 API calls 100350 4141f5 100342->100350 100343->100342 100345 414324 100464 41cf50 LdrLoadDll RtlFreeHeap 100345->100464 100347 41432e 100465 41cf50 LdrLoadDll RtlFreeHeap 100347->100465 100349 414338 100466 41cf50 LdrLoadDll RtlFreeHeap 100349->100466 100463 41cf50 LdrLoadDll RtlFreeHeap 100350->100463 100352 414342 100467 41cf50 LdrLoadDll RtlFreeHeap 100352->100467 100355 415391 100354->100355 100356 414a40 8 API calls 100355->100356 100357 4153a7 100356->100357 100358 4153e2 100357->100358 100359 4153f5 100357->100359 100363 4153fa 100357->100363 100360 41bd80 2 API calls 100358->100360 100361 41bd80 2 API calls 100359->100361 100362 4153e7 100360->100362 100361->100363 100362->100224 100363->100224 100365 41ad44 100364->100365 100366 41abf0 LdrLoadDll 100364->100366 100468 41abf0 100365->100468 100366->100365 100369 41abf0 LdrLoadDll 100370 41ad56 100369->100370 100371 41abf0 LdrLoadDll 100370->100371 100372 41ad5f 100371->100372 100373 41abf0 LdrLoadDll 100372->100373 100374 41ad68 100373->100374 100375 41abf0 LdrLoadDll 100374->100375 100376 41ad71 100375->100376 100377 41abf0 LdrLoadDll 100376->100377 100378 41ad7d 100377->100378 100379 41abf0 LdrLoadDll 100378->100379 100380 41ad86 100379->100380 100381 41abf0 LdrLoadDll 100380->100381 100382 41ad8f 100381->100382 100383 41abf0 LdrLoadDll 100382->100383 100384 41ad98 100383->100384 100385 41abf0 LdrLoadDll 100384->100385 100386 41ada1 100385->100386 100387 41abf0 LdrLoadDll 100386->100387 100388 41adaa 100387->100388 100389 41abf0 LdrLoadDll 100388->100389 100390 41adb6 100389->100390 100391 41abf0 LdrLoadDll 100390->100391 100392 41adbf 100391->100392 100393 41abf0 LdrLoadDll 100392->100393 100394 41adc8 100393->100394 100395 41abf0 LdrLoadDll 100394->100395 100396 41add1 100395->100396 100397 41abf0 LdrLoadDll 100396->100397 100398 41adda 100397->100398 100399 41abf0 LdrLoadDll 100398->100399 100400 41ade3 100399->100400 100401 41abf0 LdrLoadDll 100400->100401 100402 41adef 100401->100402 100403 41abf0 LdrLoadDll 100402->100403 100404 41adf8 100403->100404 100405 41abf0 LdrLoadDll 100404->100405 100406 41ae01 100405->100406 100407 41abf0 LdrLoadDll 100406->100407 100408 41ae0a 100407->100408 100409 41abf0 LdrLoadDll 100408->100409 100410 41ae13 100409->100410 100411 41abf0 LdrLoadDll 100410->100411 100412 41ae1c 100411->100412 100413 41abf0 LdrLoadDll 100412->100413 100414 41ae28 100413->100414 100415 41abf0 LdrLoadDll 100414->100415 100416 41ae31 100415->100416 100417 41abf0 LdrLoadDll 100416->100417 100418 41ae3a 100417->100418 100419 41abf0 LdrLoadDll 100418->100419 100420 41ae43 100419->100420 100421 41abf0 LdrLoadDll 100420->100421 100422 41ae4c 100421->100422 100423 41abf0 LdrLoadDll 100422->100423 100424 41ae55 100423->100424 100425 41abf0 LdrLoadDll 100424->100425 100426 41ae61 100425->100426 100427 41abf0 LdrLoadDll 100426->100427 100428 41ae6a 100427->100428 100429 41abf0 LdrLoadDll 100428->100429 100430 41ae73 100429->100430 100431 41abf0 LdrLoadDll 100430->100431 100432 41ae7c 100431->100432 100433 41abf0 LdrLoadDll 100432->100433 100434 41ae85 100433->100434 100435 41abf0 LdrLoadDll 100434->100435 100436 41ae8e 100435->100436 100437 41abf0 LdrLoadDll 100436->100437 100438 41ae9a 100437->100438 100439 41abf0 LdrLoadDll 100438->100439 100440 41aea3 100439->100440 100441 41abf0 LdrLoadDll 100440->100441 100442 41aeac 100441->100442 100442->100228 100444 41af20 LdrLoadDll 100443->100444 100445 419e9c 100444->100445 100474 1902df0 LdrInitializeThunk 100445->100474 100446 419eb3 100446->100149 100448->100225 100450 41af20 LdrLoadDll 100449->100450 100451 41a51c NtAllocateVirtualMemory 100450->100451 100451->100327 100453 41cf00 100452->100453 100454 41cf06 100452->100454 100453->100334 100455 41bf50 2 API calls 100454->100455 100456 41cf2c 100455->100456 100456->100334 100458 41cfb5 100457->100458 100459 41cfed 100457->100459 100460 41bf50 2 API calls 100458->100460 100459->100339 100461 41cfca 100460->100461 100462 41bd80 2 API calls 100461->100462 100462->100459 100463->100345 100464->100347 100465->100349 100466->100352 100467->100331 100469 41ac0b 100468->100469 100470 414e40 LdrLoadDll 100469->100470 100471 41ac2b 100470->100471 100472 414e40 LdrLoadDll 100471->100472 100473 41acd7 100471->100473 100472->100473 100473->100369 100474->100446 100476 1902c11 100475->100476 100477 1902c1f LdrInitializeThunk 100475->100477 100476->100234 100477->100234 100479 41a64c RtlFreeHeap 100478->100479 100480 41af20 LdrLoadDll 100478->100480 100479->100238 100480->100479 100482 407eb0 100481->100482 100483 407eab 100481->100483 100484 41bd00 2 API calls 100482->100484 100483->100157 100490 407ed5 100484->100490 100485 407f38 100485->100157 100486 419e80 2 API calls 100486->100490 100487 407f3e 100489 407f64 100487->100489 100491 41a580 2 API calls 100487->100491 100489->100157 100490->100485 100490->100486 100490->100487 100492 41bd00 2 API calls 100490->100492 100497 41a580 100490->100497 100493 407f55 100491->100493 100492->100490 100493->100157 100495 40817e 100494->100495 100496 41a580 2 API calls 100494->100496 100495->100114 100496->100495 100498 41a59c 100497->100498 100499 41af20 LdrLoadDll 100497->100499 100502 1902c70 LdrInitializeThunk 100498->100502 100499->100498 100500 41a5b3 100500->100490 100502->100500 100504 41b583 100503->100504 100507 40ace0 100504->100507 100508 40ad04 100507->100508 100509 40ad40 LdrLoadDll 100508->100509 100510 409c4b 100508->100510 100509->100510 100510->100122 100512 40b053 100511->100512 100513 40b0d0 100512->100513 100527 419c50 LdrLoadDll 100512->100527 100513->100127 100516 41af20 LdrLoadDll 100515->100516 100517 40f1ab 100516->100517 100517->100135 100518 41a790 100517->100518 100519 41a796 100518->100519 100520 41af20 LdrLoadDll 100519->100520 100521 41a7af LookupPrivilegeValueW 100520->100521 100521->100131 100523 41af20 LdrLoadDll 100522->100523 100524 41a23c 100523->100524 100528 1902ea0 LdrInitializeThunk 100524->100528 100525 41a25b 100525->100132 100527->100513 100528->100525 100530 40b1e0 100529->100530 100531 40b030 LdrLoadDll 100530->100531 100532 40b1f4 100531->100532 100532->100069 100534 40ae41 100533->100534 100535 40ae3d 100533->100535 100536 40ae5a 100534->100536 100537 40ae8c 100534->100537 100535->100072 100579 419c90 LdrLoadDll 100536->100579 100580 419c90 LdrLoadDll 100537->100580 100539 40ae9d 100539->100072 100541 40ae7c 100541->100072 100543 40f490 3 API calls 100542->100543 100544 4143b6 100543->100544 100544->100074 100546 408a79 100545->100546 100581 4087a0 100545->100581 100548 4087a0 19 API calls 100546->100548 100551 408a9d 100546->100551 100549 408a8a 100548->100549 100549->100551 100599 40f700 10 API calls 100549->100599 100551->100076 100553 41af20 LdrLoadDll 100552->100553 100554 41a4dc 100553->100554 100718 1902e80 LdrInitializeThunk 100554->100718 100555 40c312 100557 40f490 100555->100557 100558 40f4ad 100557->100558 100719 419f80 100558->100719 100561 40f4f5 100561->100080 100562 419fd0 2 API calls 100563 40f51e 100562->100563 100563->100080 100565 419fec 100564->100565 100566 41af20 LdrLoadDll 100564->100566 100725 1902d10 LdrInitializeThunk 100565->100725 100566->100565 100567 40c375 100567->100086 100567->100089 100570 41af20 LdrLoadDll 100569->100570 100571 41a03c 100570->100571 100726 1902d30 LdrInitializeThunk 100571->100726 100572 40c449 100572->100097 100575 41af20 LdrLoadDll 100574->100575 100576 419dfc 100575->100576 100727 1902fb0 LdrInitializeThunk 100576->100727 100577 40c49c 100577->100101 100579->100541 100580->100539 100582 407ea0 4 API calls 100581->100582 100597 4087ba 100582->100597 100583 408a49 100583->100546 100584 408a3f 100585 408160 2 API calls 100584->100585 100585->100583 100588 419ec0 2 API calls 100588->100597 100590 40c4b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 100590->100597 100591 41a450 LdrLoadDll NtClose 100591->100597 100596 419de0 2 API calls 100596->100597 100597->100583 100597->100584 100597->100588 100597->100590 100597->100591 100597->100596 100600 419cd0 100597->100600 100603 4085d0 100597->100603 100615 40f5e0 LdrLoadDll NtClose 100597->100615 100616 419d50 LdrLoadDll 100597->100616 100617 419d80 LdrLoadDll 100597->100617 100618 419e10 LdrLoadDll 100597->100618 100619 4083a0 100597->100619 100635 405f60 LdrLoadDll 100597->100635 100599->100551 100601 41af20 LdrLoadDll 100600->100601 100602 419cec 100601->100602 100602->100597 100604 4085e6 100603->100604 100636 419840 100604->100636 100606 4085fb 100611 408771 100606->100611 100657 4081a0 100606->100657 100608 4086e5 100609 4083a0 11 API calls 100608->100609 100608->100611 100610 408713 100609->100610 100610->100611 100612 419ec0 2 API calls 100610->100612 100611->100597 100613 408748 100612->100613 100613->100611 100614 41a4c0 2 API calls 100613->100614 100614->100611 100615->100597 100616->100597 100617->100597 100618->100597 100620 4083c9 100619->100620 100697 408310 100620->100697 100623 41a4c0 2 API calls 100624 4083dc 100623->100624 100624->100623 100625 408467 100624->100625 100627 408462 100624->100627 100705 40f660 100624->100705 100625->100597 100626 41a450 2 API calls 100628 40849a 100626->100628 100627->100626 100628->100625 100629 419cd0 LdrLoadDll 100628->100629 100630 4084ff 100629->100630 100630->100625 100709 419d10 100630->100709 100632 408563 100632->100625 100633 414a40 8 API calls 100632->100633 100634 4085b8 100633->100634 100634->100597 100635->100597 100637 41bf50 2 API calls 100636->100637 100638 419857 100637->100638 100664 409310 100638->100664 100640 419872 100641 4198b0 100640->100641 100642 419899 100640->100642 100644 41bd00 2 API calls 100641->100644 100643 41bd80 2 API calls 100642->100643 100645 4198a6 100643->100645 100646 4198ea 100644->100646 100645->100606 100647 41bd00 2 API calls 100646->100647 100648 419903 100647->100648 100654 419ba4 100648->100654 100670 41bd40 100648->100670 100651 419b90 100652 41bd80 2 API calls 100651->100652 100653 419b9a 100652->100653 100653->100606 100655 41bd80 2 API calls 100654->100655 100656 419bf9 100655->100656 100656->100606 100658 40829f 100657->100658 100659 4081b5 100657->100659 100658->100608 100659->100658 100660 414a40 8 API calls 100659->100660 100661 408222 100660->100661 100662 41bd80 2 API calls 100661->100662 100663 408249 100661->100663 100662->100663 100663->100608 100665 409335 100664->100665 100666 40ace0 LdrLoadDll 100665->100666 100667 409368 100666->100667 100669 40938d 100667->100669 100673 40cf10 100667->100673 100669->100640 100691 41a540 100670->100691 100674 40cf3c 100673->100674 100675 41a1a0 LdrLoadDll 100674->100675 100676 40cf55 100675->100676 100677 40cf5c 100676->100677 100684 41a1e0 100676->100684 100677->100669 100681 40cf97 100682 41a450 2 API calls 100681->100682 100683 40cfba 100682->100683 100683->100669 100685 41a1fc 100684->100685 100686 41af20 LdrLoadDll 100684->100686 100690 1902ca0 LdrInitializeThunk 100685->100690 100686->100685 100687 40cf7f 100687->100677 100689 41a7d0 LdrLoadDll 100687->100689 100689->100681 100690->100687 100692 41af20 LdrLoadDll 100691->100692 100693 41a55c 100692->100693 100696 1902f90 LdrInitializeThunk 100693->100696 100694 419b89 100694->100651 100694->100654 100696->100694 100698 408328 100697->100698 100699 40ace0 LdrLoadDll 100698->100699 100700 408343 100699->100700 100701 414e40 LdrLoadDll 100700->100701 100702 408353 100701->100702 100703 40835c PostThreadMessageW 100702->100703 100704 408370 100702->100704 100703->100704 100704->100624 100706 40f673 100705->100706 100712 419e50 100706->100712 100710 41af20 LdrLoadDll 100709->100710 100711 419d2c 100709->100711 100710->100711 100711->100632 100713 419e6c 100712->100713 100714 41af20 LdrLoadDll 100712->100714 100717 1902dd0 LdrInitializeThunk 100713->100717 100714->100713 100715 40f69e 100715->100624 100717->100715 100718->100555 100720 419f9c 100719->100720 100721 41af20 LdrLoadDll 100719->100721 100724 1902f30 LdrInitializeThunk 100720->100724 100721->100720 100722 40f4ee 100722->100561 100722->100562 100724->100722 100725->100567 100726->100572 100727->100577

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 41a3d0-41a419 call 41af20 NtReadFile
                                  APIs
                                  • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A415
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileRead
                                  • String ID: !JA$bMA$bMA
                                  • API String ID: 2738559852-4222312340
                                  • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                  • Instruction ID: 54437c4e75339082d0912fbe7e6c9053912bd6928cda1a9760da43cab1c95c7d
                                  • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                  • Instruction Fuzzy Hash: C3F0A4B2200208ABCB14DF89DC81EEB77ADAF8C754F158249BA1D97241D630E8518BA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 3 41a44a-41a44c 4 41a40a-41a419 NtReadFile 3->4 5 41a44e-41a479 call 41af20 NtClose 3->5
                                  APIs
                                  • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A415
                                  • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A475
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseFileRead
                                  • String ID: bMA
                                  • API String ID: 752142053-4028532242
                                  • Opcode ID: 78af462d15d3bac150910254672ddd015a6ee1d60f60359f045ee51e6f0d6073
                                  • Instruction ID: 82e347cc4db29127b742922a7b4c660f09a1c7a08bf06e2a5bfc2d387f9b3662
                                  • Opcode Fuzzy Hash: 78af462d15d3bac150910254672ddd015a6ee1d60f60359f045ee51e6f0d6073
                                  • Instruction Fuzzy Hash: 57E02B762052046FD710EB94BC85DE7BB58EF84334F14425FF95C5B241C435E54087E0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 246 40ace0-40acfc 247 40ad04-40ad09 246->247 248 40acff call 41cc10 246->248 249 40ad0b-40ad0e 247->249 250 40ad0f-40ad1d call 41d030 247->250 248->247 253 40ad2d-40ad3e call 41b460 250->253 254 40ad1f-40ad2a call 41d2b0 250->254 259 40ad40-40ad54 LdrLoadDll 253->259 260 40ad57-40ad5a 253->260 254->253 259->260
                                  APIs
                                  • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD52
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Load
                                  • String ID:
                                  • API String ID: 2234796835-0
                                  • Opcode ID: 343ab67df369899ddd45e960eb1e1cf1cc0407856a101373337c9296a528243f
                                  • Instruction ID: 93036d1b31c8ba6342ae8de3f2893f5930aff37f33252288d1eb8296453bc5b5
                                  • Opcode Fuzzy Hash: 343ab67df369899ddd45e960eb1e1cf1cc0407856a101373337c9296a528243f
                                  • Instruction Fuzzy Hash: FF015EB5E0020DABDB10EBA1DC42FDEB3789F14308F0041AAE908A7281F634EB54CB95

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 261 41a320-41a371 call 41af20 NtCreateFile
                                  APIs
                                  • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A36D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                  • Instruction ID: 30690d9e011530b668ed3b4ae7cc5c3fda29d367b226dbf4f68f65ca016a7565
                                  • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                  • Instruction Fuzzy Hash: FDF0BDB2201208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E8518BA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 269 41a500-41a53d call 41af20 NtAllocateVirtualMemory
                                  APIs
                                  • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B0F4,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A539
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateMemoryVirtual
                                  • String ID:
                                  • API String ID: 2167126740-0
                                  • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                  • Instruction ID: c35769ceed384df61eeb5fc049e905e887b244236103aac277853e7772ac0dd9
                                  • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                  • Instruction Fuzzy Hash: 75F015B2200208ABCB14DF89DC81EEB77ADAF88754F118149BE0897241C630F811CBA4
                                  APIs
                                  • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A475
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                  • Instruction ID: e48275ca6f7768b9f0fd4fab79f6d7fda959a909e55c262f35bdb2090c9231ed
                                  • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                  • Instruction Fuzzy Hash: E5D01776200214ABD710EB99DC85EE77BADEF48764F15449ABA189B242C530FA1086E0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 17483e9cc34104d38ebf61f7d9be9ba42617336c540f0fff4b63276ff294361e
                                  • Instruction ID: 4747898835c741d81b743da82ed8e3641fe36c7a9ef8101c1423a694fd3cbe4c
                                  • Opcode Fuzzy Hash: 17483e9cc34104d38ebf61f7d9be9ba42617336c540f0fff4b63276ff294361e
                                  • Instruction Fuzzy Hash: B390023224150C03D1807158440864A504997D2301F95C015A0165654DCB158B9977A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 207a224a6d97410a7c174ca1298fa6a6faa4eff56e62f5b421d0643bc8e7e21e
                                  • Instruction ID: 9dd590b80ca8d263e8c8decef4b62e3293d11d00ce83f15b6ea6e6e18d6a8c71
                                  • Opcode Fuzzy Hash: 207a224a6d97410a7c174ca1298fa6a6faa4eff56e62f5b421d0643bc8e7e21e
                                  • Instruction Fuzzy Hash: A790026224250403410571584418616904E97E1201B55C021E1154590DC62589D17225
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 2902de44e53b58104a79edc9a21974f46e958fde15ea4f55d27535f27c0af912
                                  • Instruction ID: e1931cc9faa3fdfb71971b582b644ad93638caee1debb1de55a9cf1f87be20cc
                                  • Opcode Fuzzy Hash: 2902de44e53b58104a79edc9a21974f46e958fde15ea4f55d27535f27c0af912
                                  • Instruction Fuzzy Hash: 68900226251504030105B5580708507508A97D6351355C021F1155550CD72189A16221
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 6dba73a923ad788fe7f536546312a32761b19a6b0f0a705c38efc2037dee55a6
                                  • Instruction ID: d63ababf227b957416338b200110bb589615e38454b4c95223825d2be8f4b9ad
                                  • Opcode Fuzzy Hash: 6dba73a923ad788fe7f536546312a32761b19a6b0f0a705c38efc2037dee55a6
                                  • Instruction Fuzzy Hash: 7E900222282545535545B1584408507904AA7E1241795C012A1554950CC6269996E721
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: e599ee3726d62356001fa4c34a38219592f9e26c3f2cab961b8a39d06fad6af0
                                  • Instruction ID: 46b8e28d0f59d6a14e7855580a8d196c1bcaf16253226a86253360d530c5db5b
                                  • Opcode Fuzzy Hash: e599ee3726d62356001fa4c34a38219592f9e26c3f2cab961b8a39d06fad6af0
                                  • Instruction Fuzzy Hash: D390023224150813D11171584508707504D97D1241F95C412A0564558DD7568A92B221
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 8f250eac3064200fb5de32f75f93007ef3374031c6f7611d727fec3c244639eb
                                  • Instruction ID: abf4e191c5620be3267a6699c7341d3f5e909367e6f9cf80bf1aac0dfc54e508
                                  • Opcode Fuzzy Hash: 8f250eac3064200fb5de32f75f93007ef3374031c6f7611d727fec3c244639eb
                                  • Instruction Fuzzy Hash: A290022A25350403D1807158540C60A504997D2202F95D415A0155558CCA1589A96321
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: ffec56de04407224aa63c067f0690b89c863461505ea4be76225de4c29bf572f
                                  • Instruction ID: aaa10ecdff2ca0c29c9c8c0ab4374745bf6cb57da7421aeba061c1acb2bcf8b0
                                  • Opcode Fuzzy Hash: ffec56de04407224aa63c067f0690b89c863461505ea4be76225de4c29bf572f
                                  • Instruction Fuzzy Hash: E690022234150403D1407158541C6069049E7E2301F55D011E0554554CDA1589966322
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 812e980ae180ddb9ed62e1fff3d2cf0507c62b20d22cb2009b6273ce640c5397
                                  • Instruction ID: 8a7deb3a2136f16b4344b8b1f33fa3e5e123596870d809be0bb0e05f84f14bd7
                                  • Opcode Fuzzy Hash: 812e980ae180ddb9ed62e1fff3d2cf0507c62b20d22cb2009b6273ce640c5397
                                  • Instruction Fuzzy Hash: A190023224150803D1007598540C646504997E1301F55D011A5164555EC76589D17231
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 692f0ac29e522085c244b88ca908226b4321a21427afc867be98836eba68ee58
                                  • Instruction ID: c840ec7eb458d30fd5be85afc81702f348e8dadd10d3ba99ff64467949554c9c
                                  • Opcode Fuzzy Hash: 692f0ac29e522085c244b88ca908226b4321a21427afc867be98836eba68ee58
                                  • Instruction Fuzzy Hash: 1390023224158C03D1107158840874A504997D1301F59C411A4564658DC79589D17221
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: bfa79fc7dc20a74c000e29e002ce0a54f069e268026d621dab4010fc9945cff4
                                  • Instruction ID: f1d06beef986d3302cdf3aba72910e2f0dbd7097f0c7da886fc1b7971928f2a2
                                  • Opcode Fuzzy Hash: bfa79fc7dc20a74c000e29e002ce0a54f069e268026d621dab4010fc9945cff4
                                  • Instruction Fuzzy Hash: FE90023224190803D1007158481870B504997D1302F55C011A12A4555DC72589917671
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 192d3e674ea706d255bc10bc350d0008b95a08ef709c025a64d8fef61eaa14fd
                                  • Instruction ID: 3c5ad6a92105a814a476fd621ec92f6f11df1783cee72661165ba3ef744d9145
                                  • Opcode Fuzzy Hash: 192d3e674ea706d255bc10bc350d0008b95a08ef709c025a64d8fef61eaa14fd
                                  • Instruction Fuzzy Hash: 19900222641504434140716888489069049BBE2211755C121A0AD8550DC65989A56765
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: e0a8ec78d32015d9e244ebe691455639c0ed1ad8eae6819aa90fb5bad7f7ce5c
                                  • Instruction ID: 9c29b5e98423010fbe354d8047fb229932fcd9d071226121d9a0b0c2adb08bf5
                                  • Opcode Fuzzy Hash: e0a8ec78d32015d9e244ebe691455639c0ed1ad8eae6819aa90fb5bad7f7ce5c
                                  • Instruction Fuzzy Hash: 45900222251D0443D20075684C18B07504997D1303F55C115A0294554CCA1589A16621
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 22ff81413a6ed07ef4a42c660ae158772597b5aa45d38b43df92341c07fa49b2
                                  • Instruction ID: 490acebe67f3f8f82bfabf8769f1c9aeab86942f0aa4dcc5d3e12bedba6e7f70
                                  • Opcode Fuzzy Hash: 22ff81413a6ed07ef4a42c660ae158772597b5aa45d38b43df92341c07fa49b2
                                  • Instruction Fuzzy Hash: BF90026238150843D10071584418B065049D7E2301F55C015E11A4554DC719CD927226
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: b9f310d66ade32d4a2e36182e6ee3f4ad90aa946b72260182d5e0bac64ebcde9
                                  • Instruction ID: d5d5706f086f39066d52674f9823db055531e40407834140e3d2e3cf38fc20e3
                                  • Opcode Fuzzy Hash: b9f310d66ade32d4a2e36182e6ee3f4ad90aa946b72260182d5e0bac64ebcde9
                                  • Instruction Fuzzy Hash: 5A90022264150903D10171584408616504E97D1241F95C022A1164555ECB258AD2B231
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 40ceb004200bdaaa664561461f91b7ef5373eccf2d1c91db1460c68ec806f34e
                                  • Instruction ID: b62a4a3db2d6c2e0b48b914fdbc40e92ee8bd9b09413bd493d3a39ad16c79520
                                  • Opcode Fuzzy Hash: 40ceb004200bdaaa664561461f91b7ef5373eccf2d1c91db1460c68ec806f34e
                                  • Instruction Fuzzy Hash: 9D90027224150803D14071584408746504997D1301F55C011A51A4554EC7598ED57765
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 853c01b66d24f589df6b89bde03758f04558a5ab365de05a0f584bb7a63a4c44
                                  • Instruction ID: 4f20240aff7f2371bb6e5cfcebb6b85206ba00274494e6c7b70a30fa46eb6871
                                  • Opcode Fuzzy Hash: 853c01b66d24f589df6b89bde03758f04558a5ab365de05a0f584bb7a63a4c44
                                  • Instruction Fuzzy Hash: 48213CB2D4420957CB25D664AD52BFF737CAB54314F04007FE949A3182F638BF498BA6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 8 41a5f0-41a621 call 41af20 RtlAllocateHeap
                                  APIs
                                  • RtlAllocateHeap.NTDLL(&EA,?,00414C9F,00414C9F,?,00414526,?,?,?,?,?,00000000,00409CE3,?), ref: 0041A61D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID: &EA
                                  • API String ID: 1279760036-1330915590
                                  • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                  • Instruction ID: 65e1271fa0e6f293e5ca7d904ec396d69fb6d51de338ced040ab1bfa87458b74
                                  • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                  • Instruction Fuzzy Hash: 1DE012B2200208ABDB14EF99DC41EA777ADAF88668F118559BA085B242C630F9118AB0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 206 408308-40835a call 41be20 call 41c9c0 call 40ace0 call 414e40 216 40835c-40836e PostThreadMessageW 206->216 217 40838e-408392 206->217 218 408370-40838a call 40a470 216->218 219 40838d 216->219 218->219 219->217
                                  APIs
                                  • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MessagePostThread
                                  • String ID:
                                  • API String ID: 1836367815-0
                                  • Opcode ID: 065be77a2881a5b1f8aced5a24e4f242b91c233ff3050fde956ed18a1a60450f
                                  • Instruction ID: afae0caa1c39b737317ca9dc2b564b041b93294899a19f6d17be64024b408348
                                  • Opcode Fuzzy Hash: 065be77a2881a5b1f8aced5a24e4f242b91c233ff3050fde956ed18a1a60450f
                                  • Instruction Fuzzy Hash: FC018D71A8132877E721A6559C43FFE771C5B40B55F05012DFF04BA1C1D6A8690546EA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 222 41a735-41a73f 224 41a741-41a759 222->224 225 41a796-41a7aa call 41af20 222->225 226 41a75f-41a780 224->226 227 41a75a call 41af20 224->227 229 41a7af-41a7c4 LookupPrivilegeValueW 225->229 227->226
                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7C0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: ff988c8709d1881a8a535757e5a001832c26c0b96dd1c28a214fedb7130965fc
                                  • Instruction ID: aa9a3ddb18fe6b28c4c61ad41bd484711e65d3f45526e0adcb2799af12512e92
                                  • Opcode Fuzzy Hash: ff988c8709d1881a8a535757e5a001832c26c0b96dd1c28a214fedb7130965fc
                                  • Instruction Fuzzy Hash: 35117CB62002086BDB14DF99DC85FEB37ADEF88314F04855AFA086B285C534E8158BB5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 231 408310-40831f 232 408328-40835a call 41c9c0 call 40ace0 call 414e40 231->232 233 408323 call 41be20 231->233 240 40835c-40836e PostThreadMessageW 232->240 241 40838e-408392 232->241 233->232 242 408370-40838a call 40a470 240->242 243 40838d 240->243 242->243 243->241
                                  APIs
                                  • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MessagePostThread
                                  • String ID:
                                  • API String ID: 1836367815-0
                                  • Opcode ID: 6793861beeebbadff428f1e0055fcae04fb265a346085d9c044c4ec0df2940a0
                                  • Instruction ID: a0f03ca10d03d1d5c38d3c187be8154ddc7636efa3ebbcfd239e67dddfad06e3
                                  • Opcode Fuzzy Hash: 6793861beeebbadff428f1e0055fcae04fb265a346085d9c044c4ec0df2940a0
                                  • Instruction Fuzzy Hash: B4018471A8032877E720A6959C43FFE776C6B40B54F05012AFF04BA1C1E6A8690546EA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 264 41a622-41a62b 265 41a5b5 264->265 266 41a62d-41a647 call 41af20 264->266 268 41a64c-41a661 RtlFreeHeap 266->268
                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00409CE3,?,?,00409CE3,00000060,00000000,00000000,?,?,00409CE3,?,00000000), ref: 0041A65D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: 9708d594edcda5fc8893eca15c6f157fdf37ca12e2aee08b9fa9ee063b66a24e
                                  • Instruction ID: d7e5308ecc6ccac864cb968cc564e8cbba3d48c91f9b9386b1e81575d64c18d9
                                  • Opcode Fuzzy Hash: 9708d594edcda5fc8893eca15c6f157fdf37ca12e2aee08b9fa9ee063b66a24e
                                  • Instruction Fuzzy Hash: B7F0E5B13003106FDB18DF68DC49EE7B7AAEF44714F004519F9084B261C271E9108BF0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 272 41a783-41a7a9 273 41a7af-41a7c4 LookupPrivilegeValueW 272->273 274 41a7aa call 41af20 272->274 274->273
                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7C0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: 046012ea1fbb5d5a514f3d6fb2e3c1b29012e2ea10f6d07498b6a870de564b88
                                  • Instruction ID: 840213f32d286533af33f6012fc42ee6a5c520b62d09656e1579d6d15b154f5e
                                  • Opcode Fuzzy Hash: 046012ea1fbb5d5a514f3d6fb2e3c1b29012e2ea10f6d07498b6a870de564b88
                                  • Instruction Fuzzy Hash: 55F0A0B1205290AFDB10DF18DC89EA77BE8EF45224F14869AF8C95B543C630E805CBA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 275 41a630-41a646 276 41a64c-41a661 RtlFreeHeap 275->276 277 41a647 call 41af20 275->277 277->276
                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00409CE3,?,?,00409CE3,00000060,00000000,00000000,?,?,00409CE3,?,00000000), ref: 0041A65D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                  • Instruction ID: a31e03847b69acb9206512889bce5d114748d47cfafea9ced6338f279cce3475
                                  • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                  • Instruction Fuzzy Hash: 64E04FB12002046BD714DF59DC45EE777ADEF88754F014559FD0857241C630F910CAF0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 278 41a790-41a7c4 call 41af20 LookupPrivilegeValueW
                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7C0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                  • Instruction ID: b8658252b81b08ed33e4a874e4d8f80b0614426e32f2ee3a7d9107b08e04f012
                                  • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                  • Instruction Fuzzy Hash: 9EE01AB12002086BDB10DF49DC85EE737ADAF88654F018155BA0857241C934E8118BF5
                                  APIs
                                  • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A698
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitProcess
                                  • String ID:
                                  • API String ID: 621844428-0
                                  • Opcode ID: a1f4ec23c2344254869d896560aa4a054872f941de23065e7b87c3540b0d0a4f
                                  • Instruction ID: 9aec822396f7dc7e87692cc451382bbf4d8083268a106d38d77498c9bf48e812
                                  • Opcode Fuzzy Hash: a1f4ec23c2344254869d896560aa4a054872f941de23065e7b87c3540b0d0a4f
                                  • Instruction Fuzzy Hash: 48E086752011547BD720DF24CC85FD737A4AF49394F058595B9495F342D234E919CBD1
                                  APIs
                                  • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A698
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2101927673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_DOC_PDF.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitProcess
                                  • String ID:
                                  • API String ID: 621844428-0
                                  • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                  • Instruction ID: 94fb8da58e6992106aa2b0ab061ea4c6965e877b66759b154152d16d38dd5c99
                                  • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                  • Instruction Fuzzy Hash: B9D017726002187BD620EB99DC85FD777ACDF487A4F0180AABA1C6B242C531FA108AE1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: d9eda37bac7a9496e83ae781fa53db31723ab003aaa7d250b33dff3d0268e0e2
                                  • Instruction ID: fb8d811edef73eaea1eaba2250e96b93183ae62996209129666f4b8193eba6c4
                                  • Opcode Fuzzy Hash: d9eda37bac7a9496e83ae781fa53db31723ab003aaa7d250b33dff3d0268e0e2
                                  • Instruction Fuzzy Hash: DFB09B72D415D5CADA12E764460C717794877D1701F15C065D2170685F8738C1D1F275
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                  • API String ID: 0-2160512332
                                  • Opcode ID: ab4e5a3b2ee3bd6a46e1667d66623e9f9b9fb5d5d9bcc0cf1d45d9b5ef04e255
                                  • Instruction ID: 02eaed0991fc80f3750fbb65de482a7b7ecc2583548262fac5f83a690bb34889
                                  • Opcode Fuzzy Hash: ab4e5a3b2ee3bd6a46e1667d66623e9f9b9fb5d5d9bcc0cf1d45d9b5ef04e255
                                  • Instruction Fuzzy Hash: FD929F71608342AFE721DF29D880F6BB7E8BB84755F04491DFA98D7290D770E944CB92
                                  Strings
                                  • Invalid debug info address of this critical section, xrefs: 019354B6
                                  • double initialized or corrupted critical section, xrefs: 01935508
                                  • Thread is in a state in which it cannot own a critical section, xrefs: 01935543
                                  • 8, xrefs: 019352E3
                                  • Thread identifier, xrefs: 0193553A
                                  • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 0193540A, 01935496, 01935519
                                  • Critical section address, xrefs: 01935425, 019354BC, 01935534
                                  • Critical section debug info address, xrefs: 0193541F, 0193552E
                                  • corrupted critical section, xrefs: 019354C2
                                  • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 019354E2
                                  • undeleted critical section in freed memory, xrefs: 0193542B
                                  • Critical section address., xrefs: 01935502
                                  • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 019354CE
                                  • Address of the debug info found in the active list., xrefs: 019354AE, 019354FA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                  • API String ID: 0-2368682639
                                  • Opcode ID: 1e6d6d1156334f2493a9b84611f3395db36672b9e48c092c0bec8d8973b6b9af
                                  • Instruction ID: 03f7645be68a8a850e2e5d5f7984e21e3096636b3cbd2ccc3cb714ff6697a29a
                                  • Opcode Fuzzy Hash: 1e6d6d1156334f2493a9b84611f3395db36672b9e48c092c0bec8d8973b6b9af
                                  • Instruction Fuzzy Hash: 088190B0A41348EFEB20CF99C884FAEBBB9BB49705F554119F508F7280D375AA40CB60
                                  Strings
                                  • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 01932624
                                  • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 01932498
                                  • @, xrefs: 0193259B
                                  • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 019322E4
                                  • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 01932602
                                  • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 019325EB
                                  • RtlpResolveAssemblyStorageMapEntry, xrefs: 0193261F
                                  • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 01932409
                                  • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 01932412
                                  • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 01932506
                                  • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 019324C0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                  • API String ID: 0-4009184096
                                  • Opcode ID: c694b474c20be7f31e28984182e43f0b80de8769a558a1c76f3f2d3f3e150996
                                  • Instruction ID: ac16d3a4eddb536817bea1e9df3d14c88f914c197c9ac8a3ff0b68dde5a498c8
                                  • Opcode Fuzzy Hash: c694b474c20be7f31e28984182e43f0b80de8769a558a1c76f3f2d3f3e150996
                                  • Instruction Fuzzy Hash: 51025EB1D002299BDB21DB58CC84B9AB7B8AF54704F4041EAA74DE7241EB71AF84CF59
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                  • API String ID: 0-2515994595
                                  • Opcode ID: b70ca0ba6d47c359fa6a2eb209bfeda8ab4ad3c21ce6387bf8d4d00ec631c812
                                  • Instruction ID: 09ae1f4c0365065ac177adb125b974cda35d878ddc2cef0c673872f44074cb1e
                                  • Opcode Fuzzy Hash: b70ca0ba6d47c359fa6a2eb209bfeda8ab4ad3c21ce6387bf8d4d00ec631c812
                                  • Instruction Fuzzy Hash: BA51D1715143059BC729DF188844BABBBECEFA8354F14491DEA9DC7284E774D608CBA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                  • API String ID: 0-1700792311
                                  • Opcode ID: 8ba11cfaf3ea152310226b8cab9004604ff7cd0c2eefd7c3518c8191b7692f3d
                                  • Instruction ID: 683436d7a530473b29b74a0415760b78e0ce092218b950e251295991241c2607
                                  • Opcode Fuzzy Hash: 8ba11cfaf3ea152310226b8cab9004604ff7cd0c2eefd7c3518c8191b7692f3d
                                  • Instruction Fuzzy Hash: 95D1CC31604686DFDB22DFA9C491AA9BBF5FF4AB00F0C8059F54A9B352D734AA41CB11
                                  Strings
                                  • HandleTraces, xrefs: 01948C8F
                                  • VerifierDebug, xrefs: 01948CA5
                                  • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 01948A3D
                                  • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 01948A67
                                  • VerifierFlags, xrefs: 01948C50
                                  • AVRF: -*- final list of providers -*- , xrefs: 01948B8F
                                  • VerifierDlls, xrefs: 01948CBD
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                  • API String ID: 0-3223716464
                                  • Opcode ID: ca64414c0b8c93a5507c0dc001c980a91a320f2a2625c86cd0b4416adcac5f8b
                                  • Instruction ID: 2abc924b420b9dd3b29e753ffc8f13c1bf1e476259c684945a7efcf3c267efd8
                                  • Opcode Fuzzy Hash: ca64414c0b8c93a5507c0dc001c980a91a320f2a2625c86cd0b4416adcac5f8b
                                  • Instruction Fuzzy Hash: 04912971A4A316AFE722DFAC89C0F5B77E8EB95718F05091CFA49AB240D7709D00C795
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                  • API String ID: 0-1109411897
                                  • Opcode ID: 0ee9d4d7c465eb13ecdfb7b7c779d7c5ce049efc83067a5c39b40acbf2fade56
                                  • Instruction ID: 8d8097954ac880c3bdf5ea00ef2882dcdcbd1ee107a3070cdbdd9090d2d9077b
                                  • Opcode Fuzzy Hash: 0ee9d4d7c465eb13ecdfb7b7c779d7c5ce049efc83067a5c39b40acbf2fade56
                                  • Instruction Fuzzy Hash: 7CA24A74A0562A8FEB65DF18CD887A9BBB5AF45704F1442EED90DE7254DB309E80CF00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                  • API String ID: 0-792281065
                                  • Opcode ID: 140628910ea1b908dd3a351996c106395d2b8e8dd193a75e8ac3c3fe8b416c6e
                                  • Instruction ID: a731429df1631d55359da429e810fe3170276cbea89ddd533b0c245c2eb0faae
                                  • Opcode Fuzzy Hash: 140628910ea1b908dd3a351996c106395d2b8e8dd193a75e8ac3c3fe8b416c6e
                                  • Instruction Fuzzy Hash: 93914A70B043159BEB35DF58D9C4BAA7BA5BFD0B24F15022CEA08FB281E7749A41C791
                                  Strings
                                  • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 01919A2A
                                  • minkernel\ntdll\ldrinit.c, xrefs: 01919A11, 01919A3A
                                  • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 019199ED
                                  • apphelp.dll, xrefs: 018B6496
                                  • LdrpInitShimEngine, xrefs: 019199F4, 01919A07, 01919A30
                                  • Getting the shim engine exports failed with status 0x%08lx, xrefs: 01919A01
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                  • API String ID: 0-204845295
                                  • Opcode ID: f17f5475270ecfe25d86ef3aa95cd718a75b7214046d9990c43dc74c1c3c9d9f
                                  • Instruction ID: ad31728f12157fdb001fe86a62a9bd93cfd46b4b25305d2a17f8a0a6fe04ef66
                                  • Opcode Fuzzy Hash: f17f5475270ecfe25d86ef3aa95cd718a75b7214046d9990c43dc74c1c3c9d9f
                                  • Instruction Fuzzy Hash: B851A0712083089FE720DF28C9D1B9B77E9FB84748F54091DF689D7294E630EA44CB92
                                  Strings
                                  • Unable to build import redirection Table, Status = 0x%x, xrefs: 019381E5
                                  • LdrpInitializeProcess, xrefs: 018FC6C4
                                  • minkernel\ntdll\ldrinit.c, xrefs: 018FC6C3
                                  • LdrpInitializeImportRedirection, xrefs: 01938177, 019381EB
                                  • Loading import redirection DLL: '%wZ', xrefs: 01938170
                                  • minkernel\ntdll\ldrredirect.c, xrefs: 01938181, 019381F5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                  • API String ID: 0-475462383
                                  • Opcode ID: 4a96f853d8da5313516458b0bce3bd29f2091bf447f3cb62a64800d2a24dd283
                                  • Instruction ID: 25f5a97a441005c082a7b80589b21ee7b1eae78ebdb6c0cfd15f04fbf8f00dcb
                                  • Opcode Fuzzy Hash: 4a96f853d8da5313516458b0bce3bd29f2091bf447f3cb62a64800d2a24dd283
                                  • Instruction Fuzzy Hash: B731E4716483069FD224EB2CDD8AE1AB7D5BFD4B10F04051CF989EB391E624EE04C7A2
                                  Strings
                                  • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 019321BF
                                  • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 01932180
                                  • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 0193219F
                                  • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 01932178
                                  • RtlGetAssemblyStorageRoot, xrefs: 01932160, 0193219A, 019321BA
                                  • SXS: %s() passed the empty activation context, xrefs: 01932165
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                  • API String ID: 0-861424205
                                  • Opcode ID: 788f4c4a9997b831be3bbc1d0336433f376cd34f0b78f9feac99cf0a97d511c8
                                  • Instruction ID: 4ad86d6468b040443f240a1a2e863f72b7178ca47ec9a7ab441c55fbdb70d6ce
                                  • Opcode Fuzzy Hash: 788f4c4a9997b831be3bbc1d0336433f376cd34f0b78f9feac99cf0a97d511c8
                                  • Instruction Fuzzy Hash: A031C43AB412267BF7219B998C81F5A7BA9EBA5B50F05405DFB08E7240E270DF00D6A1
                                  APIs
                                    • Part of subcall function 01902DF0: LdrInitializeThunk.NTDLL ref: 01902DFA
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01900BA3
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01900BB6
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01900D60
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01900D74
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                  • String ID:
                                  • API String ID: 1404860816-0
                                  • Opcode ID: 637b9b3767077c1fc228448f891658c61a33e26a971265a08b7784520898ecb9
                                  • Instruction ID: ec80cd62e849ebf2ffbdd23aa4da37cdb8d11b199eb9f4387daf4188ce859dfd
                                  • Opcode Fuzzy Hash: 637b9b3767077c1fc228448f891658c61a33e26a971265a08b7784520898ecb9
                                  • Instruction Fuzzy Hash: 5A425B71900715DFDB21CF28C880BAAB7F9BF44314F1445AAE98DEB281D770AA85CF61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                  • API String ID: 0-379654539
                                  • Opcode ID: 5905ef225b38868f68512dc64c457a726b6483768ef5357bfaf6bc081906859c
                                  • Instruction ID: eef27cb2bb146b9f0df277c00dff61ff8cf4735a451674e9be37b7a4d424351d
                                  • Opcode Fuzzy Hash: 5905ef225b38868f68512dc64c457a726b6483768ef5357bfaf6bc081906859c
                                  • Instruction Fuzzy Hash: 65C18E7450838ACFD719CF58C084B6AB7E4BF94B08F04896EF99ACB255E734CA45CB52
                                  Strings
                                  • LdrpInitializeProcess, xrefs: 018F8422
                                  • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 018F855E
                                  • minkernel\ntdll\ldrinit.c, xrefs: 018F8421
                                  • @, xrefs: 018F8591
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                  • API String ID: 0-1918872054
                                  • Opcode ID: ea75511396a82bac951b8ea59428c93df17b389423e0f7066ca97ae4589f6051
                                  • Instruction ID: 221a281f54d384696157c0bd62e331983a4b34221667b32c7c59cac0902d4e8b
                                  • Opcode Fuzzy Hash: ea75511396a82bac951b8ea59428c93df17b389423e0f7066ca97ae4589f6051
                                  • Instruction Fuzzy Hash: 11918F71508345AFE722EF65CC84E6BBBE8BB99754F40092DFA88D6151E334DA04CB52
                                  Strings
                                  • .Local, xrefs: 018F28D8
                                  • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 019322B6
                                  • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 019321D9, 019322B1
                                  • SXS: %s() passed the empty activation context, xrefs: 019321DE
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                  • API String ID: 0-1239276146
                                  • Opcode ID: 29d8e1c6e98605e6637809010bc529c0428aa83bf3a3c3267bcfe7d8fade467b
                                  • Instruction ID: 8fa0ae62f80bb09dee5801dab7dda3664e660266ff7946bef6553dc8cabdb5ad
                                  • Opcode Fuzzy Hash: 29d8e1c6e98605e6637809010bc529c0428aa83bf3a3c3267bcfe7d8fade467b
                                  • Instruction Fuzzy Hash: 55A17A31A0122A9BDB25DF68CC84BA9B7B6BF58354F1541EADA08E7251D730DF80CF91
                                  Strings
                                  • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 01933456
                                  • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 01933437
                                  • RtlDeactivateActivationContext, xrefs: 01933425, 01933432, 01933451
                                  • SXS: %s() called with invalid flags 0x%08lx, xrefs: 0193342A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                  • API String ID: 0-1245972979
                                  • Opcode ID: 6eab080bad36a77fac0ec5108bd23331182d8c08747b49080f08be9f03d2e124
                                  • Instruction ID: 270c4bf8051135a05bc430ff145bf3494aa5803bbb5bef8998fde1826faeb5da
                                  • Opcode Fuzzy Hash: 6eab080bad36a77fac0ec5108bd23331182d8c08747b49080f08be9f03d2e124
                                  • Instruction Fuzzy Hash: 9F6122326407129BD722CF1DC885B2BB7E5FF80B21F14852EEA59DB241D734EA41CB91
                                  Strings
                                  • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 0192106B
                                  • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 019210AE
                                  • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 01920FE5
                                  • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 01921028
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                  • API String ID: 0-1468400865
                                  • Opcode ID: b1d4501d4192be3e83a9a4367b764f8e083f64f2c16a41c8d1e748c37e90d331
                                  • Instruction ID: b2755396ee4983ddc4469735ba16b7b37e963633b80a2467a66506b27c8097be
                                  • Opcode Fuzzy Hash: b1d4501d4192be3e83a9a4367b764f8e083f64f2c16a41c8d1e748c37e90d331
                                  • Instruction Fuzzy Hash: 3171A1719043459FCB21DF18C884F977FA8AFA4B54F24056CF9488B28AE734D689CBD2
                                  Strings
                                  • LdrpDynamicShimModule, xrefs: 0192A998
                                  • minkernel\ntdll\ldrinit.c, xrefs: 0192A9A2
                                  • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 0192A992
                                  • apphelp.dll, xrefs: 018E2462
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                  • API String ID: 0-176724104
                                  • Opcode ID: cdee8aa94f1f567ac13bb2b7c918b36361c8a3b6d98176d19e33ad2acfb8992a
                                  • Instruction ID: 7ef8a2715aea1d40c4ccebe75dc3e8d1a546f5781aefd5c2df7d26d75b2ccd53
                                  • Opcode Fuzzy Hash: cdee8aa94f1f567ac13bb2b7c918b36361c8a3b6d98176d19e33ad2acfb8992a
                                  • Instruction Fuzzy Hash: EF316B76B00212ABDB31DF5EDAC5E6A77BAFF84B04F15002DF904A7249D770AA41C781
                                  Strings
                                  • HEAP: , xrefs: 018D3264
                                  • HEAP[%wZ]: , xrefs: 018D3255
                                  • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 018D327D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                  • API String ID: 0-617086771
                                  • Opcode ID: c8229f798ed730441d15d7d6a479e61c88998274b3e9d7f073be3c4638a5d8c4
                                  • Instruction ID: cecc288bfe24112b7937adca9f8634f73eb613ba9308fcee834087744ae32752
                                  • Opcode Fuzzy Hash: c8229f798ed730441d15d7d6a479e61c88998274b3e9d7f073be3c4638a5d8c4
                                  • Instruction Fuzzy Hash: 2192AB71A047499FDB25CF68C440BAEBBF2FF48304F188499E859EB392D734AA41CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                  • API String ID: 0-4253913091
                                  • Opcode ID: 4f6ac3f317d4230e1efe33227512d2501dd56c697edd71f287c0b36cc5ab2064
                                  • Instruction ID: 0da636496d31ed86c6f9bfd8e179bd41f035591a6ea263cb1775d0d0a0411f98
                                  • Opcode Fuzzy Hash: 4f6ac3f317d4230e1efe33227512d2501dd56c697edd71f287c0b36cc5ab2064
                                  • Instruction Fuzzy Hash: 43F1AF70A00606EFEB15CF68C884BAAB7F5FF45304F154168E51ADB386D734EA41CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: $@
                                  • API String ID: 2994545307-1077428164
                                  • Opcode ID: 577a74f0af35f93ee1bee5006b22efad2afd69b43ae7846977e8da0029475f28
                                  • Instruction ID: eb627458d534e97c329c74e61644dad66663b56dc031de818e8a71dc372ca0fd
                                  • Opcode Fuzzy Hash: 577a74f0af35f93ee1bee5006b22efad2afd69b43ae7846977e8da0029475f28
                                  • Instruction Fuzzy Hash: 70C290716083559FEB25CF28C884BABBBE5BF89714F04892DF989C7241E734D904CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: FilterFullPath$UseFilter$\??\
                                  • API String ID: 0-2779062949
                                  • Opcode ID: 1015071060ee34d5ba8c863bd60f33c662ad4514ef04c85cf506d00388cdf8aa
                                  • Instruction ID: ccb2decfdb5af8711cd0e1e4ac53ed7d86bc100f7be9137650d25531be0789a8
                                  • Opcode Fuzzy Hash: 1015071060ee34d5ba8c863bd60f33c662ad4514ef04c85cf506d00388cdf8aa
                                  • Instruction Fuzzy Hash: 93A138719516299BDB21DB68CC88BEAB7B8EB48B10F1001E9E90DE7250D7359FC5CF50
                                  Strings
                                  • minkernel\ntdll\ldrinit.c, xrefs: 0192A121
                                  • Failed to allocated memory for shimmed module list, xrefs: 0192A10F
                                  • LdrpCheckModule, xrefs: 0192A117
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                  • API String ID: 0-161242083
                                  • Opcode ID: c95d41794fab8b88cc1f0472e5e4cbd1543ef88e9f257d3855fcc7b6584e7dd8
                                  • Instruction ID: 38d33c38356fe2ebb487adb3348dc26b96ef99c0818444456f62c6abe721370f
                                  • Opcode Fuzzy Hash: c95d41794fab8b88cc1f0472e5e4cbd1543ef88e9f257d3855fcc7b6584e7dd8
                                  • Instruction Fuzzy Hash: 9871EE71B00205DFDB25DF6CCA84AAEB7F4FB85704F14482DE906E7645E674AE41CB41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                  • API String ID: 0-1334570610
                                  • Opcode ID: cfafa2f83b90f8820db8023f5488fb9bae5ed24de8e6d2b1a3349001081c256e
                                  • Instruction ID: 274dc154a71b56d99fd93acdde2650f979681e3c4a1a509ff9b534657af278a4
                                  • Opcode Fuzzy Hash: cfafa2f83b90f8820db8023f5488fb9bae5ed24de8e6d2b1a3349001081c256e
                                  • Instruction Fuzzy Hash: 6B61CE30604306DFEB29DF28C484BAABBE1FF45708F15855AE499CF296D770E981CB91
                                  Strings
                                  • LdrpInitializePerUserWindowsDirectory, xrefs: 019382DE
                                  • minkernel\ntdll\ldrinit.c, xrefs: 019382E8
                                  • Failed to reallocate the system dirs string !, xrefs: 019382D7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                  • API String ID: 0-1783798831
                                  • Opcode ID: 812b3e6ceac1133bf9e34094ded56727175cb57851af846b8d8763092694bb5b
                                  • Instruction ID: f7e618745832b29134910e0f981cf746631a2402f5cc3de8decb01340801702f
                                  • Opcode Fuzzy Hash: 812b3e6ceac1133bf9e34094ded56727175cb57851af846b8d8763092694bb5b
                                  • Instruction Fuzzy Hash: 9541D0B1518305ABD721EB6DD9C4F5B77E8EF84B54F00492EFA49D3294E770EA008B92
                                  Strings
                                  • PreferredUILanguages, xrefs: 0197C212
                                  • @, xrefs: 0197C1F1
                                  • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 0197C1C5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                  • API String ID: 0-2968386058
                                  • Opcode ID: d1b43685f0121667bd9b779d99b9fb9faf57ad6f8f7484595d3770f499c61f98
                                  • Instruction ID: fe950853c0b1a312305a8c9f87d62283d5e0e198044e142bebf5b5615ef5fa58
                                  • Opcode Fuzzy Hash: d1b43685f0121667bd9b779d99b9fb9faf57ad6f8f7484595d3770f499c61f98
                                  • Instruction Fuzzy Hash: 20413071A0020AEBDB11DFD8C895FEEBBBCAF55705F14416AE609F7280E774DA448B90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                  • API String ID: 0-1373925480
                                  • Opcode ID: 6d2ef63d8323233714321232ef32cf96b51cf602db6dd3a900c3398ac56aef7e
                                  • Instruction ID: 8d37c10dd6918fc502c4fc9ac1fd8ff862e70c1bf3776a5c76bdaa3c231f1f07
                                  • Opcode Fuzzy Hash: 6d2ef63d8323233714321232ef32cf96b51cf602db6dd3a900c3398ac56aef7e
                                  • Instruction Fuzzy Hash: 54412472A003598BEBA6DBD9C844BADBBB8FF65380F140459DD09FB781E7348981CB11
                                  Strings
                                  • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 01944888
                                  • LdrpCheckRedirection, xrefs: 0194488F
                                  • minkernel\ntdll\ldrredirect.c, xrefs: 01944899
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                  • API String ID: 0-3154609507
                                  • Opcode ID: fbb78e2746a792171f9ffda00d8e5ca1fb30eb3ed3b500e5192c5fda53261f48
                                  • Instruction ID: 9e14f853797541d89566fe60f1d54f623342b571d3def45a0867d545aa5cc97a
                                  • Opcode Fuzzy Hash: fbb78e2746a792171f9ffda00d8e5ca1fb30eb3ed3b500e5192c5fda53261f48
                                  • Instruction Fuzzy Hash: 1041A172A147519BEB31CE68D980F66BBE8BF89651B050669ED4CD7312E730E801CB92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                  • API String ID: 0-2558761708
                                  • Opcode ID: 2a11b65901e6298f13d788188cc511b4689faf2c93c3f1a62fe3b3741e8a0841
                                  • Instruction ID: 2306788e8a96491decda6fcf673efec2ebb9b356b819e43e87c2ddce2ea9e883
                                  • Opcode Fuzzy Hash: 2a11b65901e6298f13d788188cc511b4689faf2c93c3f1a62fe3b3741e8a0841
                                  • Instruction Fuzzy Hash: A51133303182169FEB29CA18C884FBAF7A4EF40B2AF198119F40ACB355DB30D941C751
                                  Strings
                                  • Process initialization failed with status 0x%08lx, xrefs: 019420F3
                                  • minkernel\ntdll\ldrinit.c, xrefs: 01942104
                                  • LdrpInitializationFailure, xrefs: 019420FA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                  • API String ID: 0-2986994758
                                  • Opcode ID: 31a70f87a57ce8aaa8f49c8ae9f88c7fed34fe0b5a653f4b0d81f06201b56f01
                                  • Instruction ID: 225f9efde0ad1a79cd151dca1a990bf1d3ba83e105e835fe767ed781baed0106
                                  • Opcode Fuzzy Hash: 31a70f87a57ce8aaa8f49c8ae9f88c7fed34fe0b5a653f4b0d81f06201b56f01
                                  • Instruction Fuzzy Hash: 05F0C235640308ABEB24E74CDD86FA9376CFB84B54F940059FB08B7285D2B0AA40CA91
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ___swprintf_l
                                  • String ID: #%u
                                  • API String ID: 48624451-232158463
                                  • Opcode ID: f662aeb4dfcfdbe50cedfe2c99d56f16eb2e50742ab1f274d93345f713f518e2
                                  • Instruction ID: bd26854e7f4f5b290e37fdffd72e5bcdbbd1a78e9963b08380d6aba35e978d9f
                                  • Opcode Fuzzy Hash: f662aeb4dfcfdbe50cedfe2c99d56f16eb2e50742ab1f274d93345f713f518e2
                                  • Instruction Fuzzy Hash: F9715C71A0024A9FDB01DFA8C990FAEB7F8BF58704F154065E905EB251EA74EE41CBA1
                                  Strings
                                  • LdrResSearchResource Enter, xrefs: 018CAA13
                                  • LdrResSearchResource Exit, xrefs: 018CAA25
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                  • API String ID: 0-4066393604
                                  • Opcode ID: 2de9577c81011ab8993982b00848966d7c00a66eefceda766d5458db25e34b32
                                  • Instruction ID: 489187c1ba0e3b67a95cc884f2ecdfbeeb112da0d80bb42b2c02b3581bfb033a
                                  • Opcode Fuzzy Hash: 2de9577c81011ab8993982b00848966d7c00a66eefceda766d5458db25e34b32
                                  • Instruction Fuzzy Hash: 01E17171A0021D9FEB26CF9DC980BEEBBB9BF48714F14452AE905E7255E738DA40CB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: `$`
                                  • API String ID: 0-197956300
                                  • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                  • Instruction ID: a78beae358c64119d8b56880c4cbeea596cdd714d52e966e4d768bbc376bed0d
                                  • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                  • Instruction Fuzzy Hash: A8C1E3312043429BEB25EF28C841B2BBBE5BFD4719F084A2EF69ACB290D774D545CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: Legacy$UEFI
                                  • API String ID: 2994545307-634100481
                                  • Opcode ID: 7006086f3c7c26d6c645b1ade3f7ca88f2628df5e5bbe8174f522245b2c33cb3
                                  • Instruction ID: f200d63107a88bea1491cb75097fc18e7d9d5eee9271689012d8e6a109593a2b
                                  • Opcode Fuzzy Hash: 7006086f3c7c26d6c645b1ade3f7ca88f2628df5e5bbe8174f522245b2c33cb3
                                  • Instruction Fuzzy Hash: A8615D71E007199FDB15DFA8C880BAEBBB9FB88700F14446DE64DEB291D731A940CB51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @$MUI
                                  • API String ID: 0-17815947
                                  • Opcode ID: d004b150fca436e0b30c334614f4ce7fbe44bf506556332387309e2ec4b247bd
                                  • Instruction ID: 5f47c8308dde893abcf7fad24f6b4b359ee7472d7983390c0092b97d6ef593f7
                                  • Opcode Fuzzy Hash: d004b150fca436e0b30c334614f4ce7fbe44bf506556332387309e2ec4b247bd
                                  • Instruction Fuzzy Hash: D6512971D0061DAEDF11DFE9CD84AEEBBBCEB44754F100529E615BB290D6309E05CB60
                                  Strings
                                  • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 018C063D
                                  • kLsE, xrefs: 018C0540
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                  • API String ID: 0-2547482624
                                  • Opcode ID: 89d1ace6c997c1228e2527c4df050e9a0012f9e3d0587e0c94a478558ff5787e
                                  • Instruction ID: edc589405a9c642a474dc4c0be855debf4547bff6381d68fbf795c256a2c7427
                                  • Opcode Fuzzy Hash: 89d1ace6c997c1228e2527c4df050e9a0012f9e3d0587e0c94a478558ff5787e
                                  • Instruction Fuzzy Hash: 12519B79604746CBD725DF68C584AA3BBE4AF84B44F10483EF69AC7241E730D645CF92
                                  Strings
                                  • RtlpResUltimateFallbackInfo Enter, xrefs: 018CA2FB
                                  • RtlpResUltimateFallbackInfo Exit, xrefs: 018CA309
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                  • API String ID: 0-2876891731
                                  • Opcode ID: c498b9af5a57bd07f3c06e9f146be5de59667a5ec1a55b01bbd920f9dd02aab5
                                  • Instruction ID: 9c243259fa5f5bf90d5462ce4b7dff926ae9ecd2c9f2e41472cda6aabd333894
                                  • Opcode Fuzzy Hash: c498b9af5a57bd07f3c06e9f146be5de59667a5ec1a55b01bbd920f9dd02aab5
                                  • Instruction Fuzzy Hash: B541E171A0465DDBDB29CF6DC850B6EBBB8FF85B04F1480A9E904DB295E3B5DA00CB41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: Cleanup Group$Threadpool!
                                  • API String ID: 2994545307-4008356553
                                  • Opcode ID: 64f0f51b83481f2c8548844c38d71abcdcc3f07f40b83fbe9e8057dd6fbfd920
                                  • Instruction ID: eb9e2617650f1e3d10dbb6224561e237f0b1c6f81294224834f38c1ba258fb79
                                  • Opcode Fuzzy Hash: 64f0f51b83481f2c8548844c38d71abcdcc3f07f40b83fbe9e8057dd6fbfd920
                                  • Instruction Fuzzy Hash: 4C01D1B2254704AFE312DF24CE85B1677E8E784B25F04893DA64CC7290E338EA14CB46
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: MUI
                                  • API String ID: 0-1339004836
                                  • Opcode ID: d2d462b6b5d8213786653f281674b09fb1e48bb8277f6ebda69ccbae42b76789
                                  • Instruction ID: 3b2b8a223d5a3ace0d245c716e280d7f3d1ff0af7089c2a708eb19acf58bb42d
                                  • Opcode Fuzzy Hash: d2d462b6b5d8213786653f281674b09fb1e48bb8277f6ebda69ccbae42b76789
                                  • Instruction Fuzzy Hash: 91824B75E002198BEB25DFADC880BEDBBB1BF48B14F14816EE959EB251D730DA41CB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3916222277
                                  • Opcode ID: abc298c86a6957bbc8bc45976bb84e07083f77b9aad94dde78c2211791136e4f
                                  • Instruction ID: bacfa966c5b19c4a5dc239a706be5e01dd7367602ce00fff3c3c2b309e23f63a
                                  • Opcode Fuzzy Hash: abc298c86a6957bbc8bc45976bb84e07083f77b9aad94dde78c2211791136e4f
                                  • Instruction Fuzzy Hash: C29173B1A40219AFEB21DF99CD85FAEBBB8EF55B50F100065F604EB190D775AD00CBA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3916222277
                                  • Opcode ID: c7d25f853aae9d5678bc719c45f29432387cb5adf647522a10a80947f13ebce4
                                  • Instruction ID: eea0e11e0c7d568bec2d96a912c0e1e975bd274950d900e56c11d8130db73590
                                  • Opcode Fuzzy Hash: c7d25f853aae9d5678bc719c45f29432387cb5adf647522a10a80947f13ebce4
                                  • Instruction Fuzzy Hash: F4918075900609AFDB22EBA9DC44FEFBB7EEF85740F100019F609A7250D7749A05CBA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: GlobalTags
                                  • API String ID: 0-1106856819
                                  • Opcode ID: 2aed8ff737b490ce43495a630153c7762c4ec98e4a7aad317481f3cb53d36c4c
                                  • Instruction ID: 3e7f944a97b9ee4bea28451884a618ef9090be6b7aa7e4120c0e3580cdda27e2
                                  • Opcode Fuzzy Hash: 2aed8ff737b490ce43495a630153c7762c4ec98e4a7aad317481f3cb53d36c4c
                                  • Instruction Fuzzy Hash: C8717075E0030AAFDF29CF9CC590AADBBF5BF88715F14812EE50AA7240E7759A41CB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .mui
                                  • API String ID: 0-1199573805
                                  • Opcode ID: ac9789b388e64b85b83b532b7d38038a76989a42fddcbcaf860bc4cbc0becb56
                                  • Instruction ID: e12444d6af89336ecf52f306529af76e3dbbaaad60b8716f8da2b2d0b7c2819c
                                  • Opcode Fuzzy Hash: ac9789b388e64b85b83b532b7d38038a76989a42fddcbcaf860bc4cbc0becb56
                                  • Instruction Fuzzy Hash: 0D519672D0022AABDF15DFE9D840AAEBBBDAF14B54F054129EA15F7240D7349901CBF4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: EXT-
                                  • API String ID: 0-1948896318
                                  • Opcode ID: 976f3cc00249d1aa4702574e9680a601305b87925d5b4b461a8174a42317234f
                                  • Instruction ID: b1b96bc0fcc5eaa4007622ed3da65d19838a696d22852511ccd6c4d16f8592b1
                                  • Opcode Fuzzy Hash: 976f3cc00249d1aa4702574e9680a601305b87925d5b4b461a8174a42317234f
                                  • Instruction Fuzzy Hash: 3A41A372508312ABD751DB79C884B6BB7E8AF88B18F45092DFA84DB180E774DB04C797
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: BinaryHash
                                  • API String ID: 0-2202222882
                                  • Opcode ID: 66df7cf9055dc56ea93a6fb6923fba2837d92c7657777eaf6a6abcccf7209785
                                  • Instruction ID: 7aead26d46a83647852367cad29646e26cef3ffd33c920dfab5f70d9b963cdb2
                                  • Opcode Fuzzy Hash: 66df7cf9055dc56ea93a6fb6923fba2837d92c7657777eaf6a6abcccf7209785
                                  • Instruction Fuzzy Hash: F84110B1D0162DAEDB21DA54CC84FDEB77CAB85714F0045A6AA0CBB140DB709E898FA5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: #
                                  • API String ID: 0-1885708031
                                  • Opcode ID: a31556b39b65b9828b3d2263f7891453cf2dd10094699899c8f56164e47ff1ff
                                  • Instruction ID: 7443e4c4dc7d683409568c29a0d4a17f5f1d43b85b612aa754caafcd59662f07
                                  • Opcode Fuzzy Hash: a31556b39b65b9828b3d2263f7891453cf2dd10094699899c8f56164e47ff1ff
                                  • Instruction Fuzzy Hash: 1D314631E003099BEB22CB6DC840BEEBBB8DF44705F904028EE48BB282C775D905CB90
                                  Strings
                                  • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 0194895E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                  • API String ID: 0-702105204
                                  • Opcode ID: d1c3ad6d4710788ed4133b2dfe36002fe6a4359231968a71ca63caf43b775073
                                  • Instruction ID: e1e8c8bb81f4e350448f6c5fc40e3a0c8f04aef4bf8faf56001a90fceed9d893
                                  • Opcode Fuzzy Hash: d1c3ad6d4710788ed4133b2dfe36002fe6a4359231968a71ca63caf43b775073
                                  • Instruction Fuzzy Hash: BC01763A210A01AFF625AFDACDC4E9A7F69EFC5794B08052CF74902211CB20AC41C793
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 115e3a13aee6723326d93852f735fba27317816388f934e205d9e641fcc313cf
                                  • Instruction ID: ebe53adccd4a7fbc682639c71a196757e90c4b4025fe8d87900354156e41bdb3
                                  • Opcode Fuzzy Hash: 115e3a13aee6723326d93852f735fba27317816388f934e205d9e641fcc313cf
                                  • Instruction Fuzzy Hash: 7942D3316083419FD725CF68C890A6FBBEDBF88740F08492EFA8A97250D775D945CB62
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8b8e19352fb98ec37bcac73b13eddb9254915712e37c8ba9f0a0ca73defe301a
                                  • Instruction ID: 33f291ef231bf44d04e65d0df9f87e8c928ff9644208972e2c2ad509cb27e797
                                  • Opcode Fuzzy Hash: 8b8e19352fb98ec37bcac73b13eddb9254915712e37c8ba9f0a0ca73defe301a
                                  • Instruction Fuzzy Hash: 7D425D75E002199FEB65CF6AC881BADBBF5BF88301F148099E94DEB242D7349981CF51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4ed20559135cfe02abab44e44efec4eb8b1e1622ccabd146fe4c55515733c4c
                                  • Instruction ID: 11323d982715584c67dde72127d63897134305dfa5cbe3b1e43a6bb3d7202237
                                  • Opcode Fuzzy Hash: a4ed20559135cfe02abab44e44efec4eb8b1e1622ccabd146fe4c55515733c4c
                                  • Instruction Fuzzy Hash: A1321370A007698FDB25CF69C844BBEBBF6BF84704F14451DD88A9BB88D735A901CB51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5bb2645ffc04b1c46a1799850fb034b644fed39702756ad22d9688cefe09563
                                  • Instruction ID: fb42704cce0001010c32387109c05da3d6b6e6c3a89a44ef5fca909f6637cb31
                                  • Opcode Fuzzy Hash: c5bb2645ffc04b1c46a1799850fb034b644fed39702756ad22d9688cefe09563
                                  • Instruction Fuzzy Hash: 3E22E2706046518BEB25CF2DC490B76BBF9BF45301F08885AD98EAF286D739E851DB70
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b0276d8de431daf9af3654f4db5d53d8fbc0df58eaaaf763d5f76d2dc7d408f
                                  • Instruction ID: cbce3f0c90d37ae5cf137be3170f67e57beabcfcad045b42491cfeb56e1d868e
                                  • Opcode Fuzzy Hash: 6b0276d8de431daf9af3654f4db5d53d8fbc0df58eaaaf763d5f76d2dc7d408f
                                  • Instruction Fuzzy Hash: 95329B70A04215CFDB25CF68C480AAABBF5FF48700F24857AE959EB395E730E951CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                  • Instruction ID: f88ab48cddb94185cbbf23c641c8bbae23d3abeb70521f56b2959e0e0c7495dd
                                  • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                  • Instruction Fuzzy Hash: 09F1AF70E0021A9BDF15CF99C484BAEBBF9BF49714F088129E909EB345E774DA41CB61
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 942022e27b0842c874363a1b6380c9c243eaed0c0a68334ddc7b692b34124a0c
                                  • Instruction ID: b37b490411df5303123916177c7b48ec0cad9c24f6ba450d5b6b2170e4efba9c
                                  • Opcode Fuzzy Hash: 942022e27b0842c874363a1b6380c9c243eaed0c0a68334ddc7b692b34124a0c
                                  • Instruction Fuzzy Hash: F6D10071E0060A9BDF45CF6AC841AFEBBF9AF88305F188169D959F7241E735E901CB60
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 515913cf9f321ac1caf19c3dc1456eddb5e9df0578f9618d61e7d43f504018bf
                                  • Instruction ID: c9cd54307f500fafea0a7f47f2ef4a3a6e7de6d26a1744a18c9dd93e865778b4
                                  • Opcode Fuzzy Hash: 515913cf9f321ac1caf19c3dc1456eddb5e9df0578f9618d61e7d43f504018bf
                                  • Instruction Fuzzy Hash: 1BE16C71508341CFC715CF28C490A6ABBE1FF89718F158A6DE999C7351EB31EA09CB92
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 07ce542574384ad5825b4f288a96f84a76e05f65a39a28e900325faa660b8da2
                                  • Instruction ID: 16764192493937c652870f255d4e69e166f366880a8c1c859b1e1dade5f55d47
                                  • Opcode Fuzzy Hash: 07ce542574384ad5825b4f288a96f84a76e05f65a39a28e900325faa660b8da2
                                  • Instruction Fuzzy Hash: C6D1E071A0020A9BDB14DF68C8C0AFA77BAFF55358F04462DE91ADB394E734EA50CB51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                  • Instruction ID: fe6d4bc3758817cefb9dda6c97b4e338c43b1125e7184c4cd88c5fc47bff121d
                                  • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                  • Instruction Fuzzy Hash: C5B17174A00609AFDF64DFD9C940EABBBB9FF84344F10446EEA0697790DA34E905CB10
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                  • Instruction ID: 70220963ab7c428d83ea80578d99c0ff810f8b96dfa9258274cb04e6a5345975
                                  • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                  • Instruction Fuzzy Hash: 7FB1283160075AAFEB11DBA8C840BBEBBFAAF84304F150155E65AEB385D734EA41CB50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1ca4efc99e2da4c11aef1a99ad23fd734b7a3f1449dcb6d284ffe74dd5c589ff
                                  • Instruction ID: 2196f1c069064d4766625460305b1e2f9f77c0c1c5d8b1e7e0292ef34592c6a7
                                  • Opcode Fuzzy Hash: 1ca4efc99e2da4c11aef1a99ad23fd734b7a3f1449dcb6d284ffe74dd5c589ff
                                  • Instruction Fuzzy Hash: 8DC146746083418FD764CF19C484BABB7E5BF98704F44496EE989C7291E7B4EA08CF92
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bdd95a8cebc6b5d0bb71ad7daf38e6d3f4778b9504054a4af75c5de1f674d252
                                  • Instruction ID: 0835b0783ec076df2d931eaa56335bf3125181759162ace1a49587245d0db619
                                  • Opcode Fuzzy Hash: bdd95a8cebc6b5d0bb71ad7daf38e6d3f4778b9504054a4af75c5de1f674d252
                                  • Instruction Fuzzy Hash: 8FB16270A0026A8BDB25DF58C890BE9B7B5BF44704F0485EAE54EE7351DB709EC5CB21
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d9a6831051f973ae317845b34b06d6b21aeebb548f211d1e351b1234b54318ea
                                  • Instruction ID: c6000256a151fdeb0efbbe1ac18814aab07ab120e6a6f95a8825864a7a37687c
                                  • Opcode Fuzzy Hash: d9a6831051f973ae317845b34b06d6b21aeebb548f211d1e351b1234b54318ea
                                  • Instruction Fuzzy Hash: 86A12671E006299FEB22DB5CC848FAEBBF8BB46714F050125EA14EB295D7749E40CBD1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2e96003fb883f9db118820ab4009540d60d80b7688aed55a068f7da88a253a2e
                                  • Instruction ID: 81e7cf3be1e4236d98046256cfa22603dd2c2cbd7b8418deb23c7e8077a1ab13
                                  • Opcode Fuzzy Hash: 2e96003fb883f9db118820ab4009540d60d80b7688aed55a068f7da88a253a2e
                                  • Instruction Fuzzy Hash: CBA11770B016169FDB26CF69C580BAA77B9FF84759F084029EA0DD72C1EB74E815CB40
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ba5affba47d8e430abe5ed8818be0b0a6a58248246ef3a754a2e864e640c8449
                                  • Instruction ID: c9f14e41ed216f11843f5cb45fa313731e2c80984d4fd3a11cf1ab5467d4e8dd
                                  • Opcode Fuzzy Hash: ba5affba47d8e430abe5ed8818be0b0a6a58248246ef3a754a2e864e640c8449
                                  • Instruction Fuzzy Hash: 40A1AD72A14612EFDB12DF1DCA80B5AB7E9FF48704F45092CE549DB651D334E902CB92
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6ce3715ed4799cd0a993ea830d382c3077ea0590534c70b07cf682ff4d409637
                                  • Instruction ID: af4d60c96e24aeae7e7e66659cb64238cee708ee9d757ccbc24d6a7da00b7e5b
                                  • Opcode Fuzzy Hash: 6ce3715ed4799cd0a993ea830d382c3077ea0590534c70b07cf682ff4d409637
                                  • Instruction Fuzzy Hash: 8AB13A71E0061AEFDF19CFADC880AADB7B9FF48311F148169E918AB355D730A941CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 422a61ab939d43899381a4a5f058d9df05fab6f04b105bae0519028793fd5c77
                                  • Instruction ID: ed6f9a3dcdd48fcf7c0dcb0ff9f7dc6c6173c7779b3bed35ae6d3a977b037660
                                  • Opcode Fuzzy Hash: 422a61ab939d43899381a4a5f058d9df05fab6f04b105bae0519028793fd5c77
                                  • Instruction Fuzzy Hash: C69195B1E0021AAFDF15CF68D884FAEBFB9AF4A710F154159E614EB351D734DA009BA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 860731e5cda246a159390ef3584a01ee3a61add2a901168c8d5a3436a7a1cb33
                                  • Instruction ID: b4b96495a4e9ed6415e8110280e4a3fcd3f58b7df26b7f3aaf5a123197e63d54
                                  • Opcode Fuzzy Hash: 860731e5cda246a159390ef3584a01ee3a61add2a901168c8d5a3436a7a1cb33
                                  • Instruction Fuzzy Hash: 4F912436A00726CBEB24EB5DC480BBD7BB6EF94758F054069E909DF284E634DA01C752
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3be340d047965f20bb5e3258f8ac0d776d9190b4e256b73b2e55efab8744900
                                  • Instruction ID: f7af3d8e52800188d3002a50fbcd8dad56c77efe25d16b4e4b33035c0c60fc1c
                                  • Opcode Fuzzy Hash: c3be340d047965f20bb5e3258f8ac0d776d9190b4e256b73b2e55efab8744900
                                  • Instruction Fuzzy Hash: 77818371E0061A9FDB15CF69C940ABEBBF9FB48700F04852EE559E7644E374D980CB94
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                  • Instruction ID: 0a59d7930abb62a629dfc56b351a49d3b54da57dd3315442d01b700f0e87a9a6
                                  • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                  • Instruction Fuzzy Hash: 44819275A0020A9FDF19DF99C480AAEBBF6FF84311F18856AD91ADB344D774E901CB50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d7a8d0569f8170a9a1777c273a27e6412d81b59528e59d184136a70d947f4ce
                                  • Instruction ID: bc0fafafae6f8aeda53867d8432c93ed01441462c5afabb122553fcfd37c6d9d
                                  • Opcode Fuzzy Hash: 8d7a8d0569f8170a9a1777c273a27e6412d81b59528e59d184136a70d947f4ce
                                  • Instruction Fuzzy Hash: 1A818F71A00609AFDB25CFA9C880BEEBBB9FF88314F11442DE659E7250D730AD45CB60
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 709fbb400c0b855e4e97279e2a9d38bc026fa0fa94f47b7f378b1766b3f8d6da
                                  • Instruction ID: 282f2d6bb1827437560e4afd94e1adc45e81ffbb8ff9099523e951d579340526
                                  • Opcode Fuzzy Hash: 709fbb400c0b855e4e97279e2a9d38bc026fa0fa94f47b7f378b1766b3f8d6da
                                  • Instruction Fuzzy Hash: 2171CA75C04229DBCB258F59D990BBEBBF4FF48B10F15411EE946AB354E730A904CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 0665b60d162258ffbe034ea9a96883de4909aa78b813363477c9bbcb85cac4cd
                                  • Instruction ID: eea8794f0ef043751a9687e97629ad1a7f7363b600fe9fba9a42b889a49b0534
                                  • Opcode Fuzzy Hash: 0665b60d162258ffbe034ea9a96883de4909aa78b813363477c9bbcb85cac4cd
                                  • Instruction Fuzzy Hash: 7B71D471E04205EFDB24DF99DA84E9AFBF8FFC0701F14415AE618AB25AC731A940CB64
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: df6448e1fba0ffbaa5b0b834a953a5b429dd2ce7621dd9e96fa5f46ce272b83d
                                  • Instruction ID: 7a9454770340046553c81008f968b4487abc6f895136e96e03f8b032bdfc237e
                                  • Opcode Fuzzy Hash: df6448e1fba0ffbaa5b0b834a953a5b429dd2ce7621dd9e96fa5f46ce272b83d
                                  • Instruction Fuzzy Hash: A571D2356047428FD321DF2CC480B2AB7E6FF84314F0585A9E899CB356DB34DA46CBA1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                  • Instruction ID: f466c8d9a5e4000a09570692a1001237f7d1bea82e4b94c8c982a0eaf58e3f0f
                                  • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                  • Instruction Fuzzy Hash: 79714F71A00619EFDB10DFA9C944EDEBBB9FF88700F144569EA09E7250DB34EA41CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 678334b43f876edecb09bc380e95443dabf8209a37e44e44765c0c29cdc34282
                                  • Instruction ID: ef7c670db95c6d7be1236d6ba08f6efeeb81f0d22eae857a4993ca6840aa59b4
                                  • Opcode Fuzzy Hash: 678334b43f876edecb09bc380e95443dabf8209a37e44e44765c0c29cdc34282
                                  • Instruction Fuzzy Hash: 5671E532200B01AFE772DF18C844F56BBFAEF40B61F544918EA5AA72E1D775E944CB50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a9649e05114d1a6394736767c2b68fa7d758aec97f480824476c274b31bef0e7
                                  • Instruction ID: 13256045bc324628039cf07f3df57cd0a3e9583561db2c3df16000cf8d8b1e68
                                  • Opcode Fuzzy Hash: a9649e05114d1a6394736767c2b68fa7d758aec97f480824476c274b31bef0e7
                                  • Instruction Fuzzy Hash: 9081DF72A083268FDB28CF9CC584BAEB7B5BF49714F15412DD905AB28AC735DE40CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 254b087b0fd296a9c456d359a307f1638bbbc40d4333078e8280d123b85da245
                                  • Instruction ID: 6cff502396a5ff433b46c509c7d86b77bad33dd6a15fc30470af1d04bb0a04ae
                                  • Opcode Fuzzy Hash: 254b087b0fd296a9c456d359a307f1638bbbc40d4333078e8280d123b85da245
                                  • Instruction Fuzzy Hash: AD712971E0020DAFDF16DF98C885FEEBBB8FF45350F104169E628A6290D774AA45CB91
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f6895d7a648e80f0a46f2855aded2000597979d26edcc8e7f3a8a71ce1b11f1
                                  • Instruction ID: b883cd9252505044e2143137b669d974748e629b1037bd94449f1a6917dd2b19
                                  • Opcode Fuzzy Hash: 0f6895d7a648e80f0a46f2855aded2000597979d26edcc8e7f3a8a71ce1b11f1
                                  • Instruction Fuzzy Hash: 7D51B072604716AFD712DE68C884E5FB7E8EFC5B50F090929BA48DB190D771ED04CBA2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f373cb69c5d22ea95348a3524fe6d6acae2381736d89213923280f8b6d0ff5ab
                                  • Instruction ID: 8bb6be190425aaa27ca748d9ea54fc516531f29f4749883e7f5a84943be6d35b
                                  • Opcode Fuzzy Hash: f373cb69c5d22ea95348a3524fe6d6acae2381736d89213923280f8b6d0ff5ab
                                  • Instruction Fuzzy Hash: 34519070900705DFD721DF5AC884A6BFBFCBF94B10F104A1ED29A976A1D7B0A545CB60
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 4592bde909f4ff9b5a892b1961f575a4936b61f0b49453854982c27a9ff20b9e
                                  • Instruction ID: c95a61673a767f86867d24ef9c430ad4b8eac5a15d34e5570f26767e5e9b90dd
                                  • Opcode Fuzzy Hash: 4592bde909f4ff9b5a892b1961f575a4936b61f0b49453854982c27a9ff20b9e
                                  • Instruction Fuzzy Hash: AD514971200A059FCB22EFA9C9C4E6AB3B9FB58744F41046DE646D7260D734EA40CB52
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e9009da13577132657f19bbc09e49390b5f986256f95ef69cce05fde69a696c
                                  • Instruction ID: d896cd3ff68af58ffc0ec732f7722bcece0d27d319dc000fede8af85a4c51633
                                  • Opcode Fuzzy Hash: 4e9009da13577132657f19bbc09e49390b5f986256f95ef69cce05fde69a696c
                                  • Instruction Fuzzy Hash: F15189716083428FD755DF69C980E6BBBE9BFC8208F44492DF589C7250EB30DA05CBA2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                  • Instruction ID: 0a7e662aae79c1c1fb806cbc49c6d105a3efdd5b2d613da98ac2fd356d0b2ba5
                                  • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                  • Instruction Fuzzy Hash: 53518D75E0021EABDF15DF98C844BEEBBF9AF46754F044069EA09EB250D734DA44CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                  • Instruction ID: 479c6b787a8df6cfe11884e841ec56301ba15542c8d90238fe6dbdb29edbd1cb
                                  • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                  • Instruction Fuzzy Hash: AC51D931D0020AEFEF21DF95C884FAEBB79BF40365F154665D61A67290E7389E40CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 539e578eeff5c5cc71b0772af0738375133898a51f1ccaf42be9c9309d63765f
                                  • Instruction ID: 5294c1b4bea8fa092769a73143a86457f55d7d8a7024a3fad1471e28ea6b51c9
                                  • Opcode Fuzzy Hash: 539e578eeff5c5cc71b0772af0738375133898a51f1ccaf42be9c9309d63765f
                                  • Instruction Fuzzy Hash: 3C41E271B016019BE729EB2DC994F7BBB9EEFD0361F488619E91D87284DB34D801C6B1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4468fbe959d22cbf06ce82bfe8997b270d0680ca58084190716300f15ec814e3
                                  • Instruction ID: ca6ac4c7ceffc45778ddd53bbf0efa6b76aba73455d1594d1ea7175d092f876b
                                  • Opcode Fuzzy Hash: 4468fbe959d22cbf06ce82bfe8997b270d0680ca58084190716300f15ec814e3
                                  • Instruction Fuzzy Hash: 6A517A76E0121ADFCB20DFA9C9C0DAEBBB9FF48759B504929D549A3304D730BA01CB91
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef9213128fb042e61fc3a874213630e3bf9ea7defae235f3f137d58e7ddee492
                                  • Instruction ID: e6e5ea4a6529987a5b44aedf856d6fac125e45f470d0382d34a6773cbc204ccf
                                  • Opcode Fuzzy Hash: ef9213128fb042e61fc3a874213630e3bf9ea7defae235f3f137d58e7ddee492
                                  • Instruction Fuzzy Hash: A541E6B1A48206AFDB29EF6D99C4F6A3765AB9572CF00002CFF0ADB345D7719A008751
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                  • Instruction ID: 407c6b4bcdb7c514c04ecb6e6bc085a966dc14cea0e28a709cf97cf6e8f7a32d
                                  • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                  • Instruction Fuzzy Hash: DB4119716017069FD725EF28C880A6AF7EAFF80310B04462FE91A87640EB30ED04C7D1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b670d6668e2a8cf3a7c585a3da3b809d81e6249a2786b9320699dbb258cd8912
                                  • Instruction ID: 1f0306afdeb016a85c01dbe70cebf1db11e2162f0f0c8b8d60af7efc9ce90db7
                                  • Opcode Fuzzy Hash: b670d6668e2a8cf3a7c585a3da3b809d81e6249a2786b9320699dbb258cd8912
                                  • Instruction Fuzzy Hash: 1F41CC39A002199FDB11DF98C440AEEBBB6FF88714F14812EFA19E7241D7349E41CBA4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ff6f23b0f12aca7cc7f16e59cb05f18c9b51dc28fcea0a052fc59d36e38805bf
                                  • Instruction ID: 1c095f2ee749de3033ea4df3ce2ad6a02c01bfa6ebc51970532efdf6b608c93c
                                  • Opcode Fuzzy Hash: ff6f23b0f12aca7cc7f16e59cb05f18c9b51dc28fcea0a052fc59d36e38805bf
                                  • Instruction Fuzzy Hash: 8441AF722143069FD721EF28C888A2BB7FAFF89318F004929E956C7615EB35E9548B51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                  • Instruction ID: 1196307eeff50eb6ce5574b8d037fe2d6a6393d5c4992ecb294a87b30e4cb2d3
                                  • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                  • Instruction Fuzzy Hash: 25516975A00215CFCB15CF98C484AAEF7B6FF84710F2881A9D959E7351D734AE82CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a98daa4a005a86872d354df632173d6d7dbfebd57dbd97dd7dc6c06f912762b5
                                  • Instruction ID: 634cc2ae4fa1d5ff712e0bd448bc30b11e4d7b5540aa55786c4fded222f14825
                                  • Opcode Fuzzy Hash: a98daa4a005a86872d354df632173d6d7dbfebd57dbd97dd7dc6c06f912762b5
                                  • Instruction Fuzzy Hash: 3B51D6B0904216DBDB25DB28CD40BE8BBB6EF51314F1882B9E569D73D1E734AA81CF41
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1186e15538cff37cef40953bad13a25dd8026467aeb2a34c8bc5bd82a4386d9f
                                  • Instruction ID: ea9a1ebfa56d6c4237a60e6a5f031d641f71743c16967ddb15799af5f32d809a
                                  • Opcode Fuzzy Hash: 1186e15538cff37cef40953bad13a25dd8026467aeb2a34c8bc5bd82a4386d9f
                                  • Instruction Fuzzy Hash: DD416F79A0032DDFDB22DF6CC940BEA77B9AF45B40F4500A9E908EB241D674DE84CB91
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                  • Instruction ID: a6c03f045958a661af1da77a342c808a0a8f315569fbb9832f53a713225e3644
                                  • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                  • Instruction Fuzzy Hash: FD419375B10205ABEB15EF99CD94EAFBBBEAF88744F544069E908E7341D670DD008770
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8f2c8aa03a76f1151f48494d6aec2b345d55bb444366ec9254544b3a5fbf01af
                                  • Instruction ID: 329ac47882f9a04cdee5672dfc788954fc61ccb52b608d6472d47cfb57713e66
                                  • Opcode Fuzzy Hash: 8f2c8aa03a76f1151f48494d6aec2b345d55bb444366ec9254544b3a5fbf01af
                                  • Instruction Fuzzy Hash: 6541D375600706DFE325CF28C880A62B7F9FF49754B108A6DE54BC7A50E730EA49CB50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f8e962c6af58344166957a57c4893efa7d5a8cd3c53c0d6703e011158b15270
                                  • Instruction ID: 82cc7d0c754ec93c22ece786fb751802338a690ab617fde89a8e7002bf99535f
                                  • Opcode Fuzzy Hash: 1f8e962c6af58344166957a57c4893efa7d5a8cd3c53c0d6703e011158b15270
                                  • Instruction Fuzzy Hash: 8041D031904219CFDB29DFACC5D87AD7BF0BF16714F140169E416EB296DB349A00CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 067f5f2abba0116b831ee569c04bbad637e42c53a7d5b6f7645e5b59ab8669bb
                                  • Instruction ID: ea704d806c2970e783fe8edc0fecbe70b316c6dffb8ca1e50a9cb974ad74bc46
                                  • Opcode Fuzzy Hash: 067f5f2abba0116b831ee569c04bbad637e42c53a7d5b6f7645e5b59ab8669bb
                                  • Instruction Fuzzy Hash: 13411532A44216CBDB24DF4CC980A9ABBB5FB95B14F14802ED502DB256C735DA42CF90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d65c382ed649ea92270c04767bb682957ff73cbf28c755550edee65e77df7ff
                                  • Instruction ID: 42b3bf8226263d5275bedcfd7b7ebe90e22fec26ce58c41ed6dd63d24803b058
                                  • Opcode Fuzzy Hash: 6d65c382ed649ea92270c04767bb682957ff73cbf28c755550edee65e77df7ff
                                  • Instruction Fuzzy Hash: 1D416D3150830A9ED712DF69C880AABB7E9EF85B54F40092EF985D7250E730DE498B93
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                  • Instruction ID: 065a3b327e2b3b77d80182b827b6644ce259ef09b44f76a0f4cd7c890bfd2886
                                  • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                  • Instruction Fuzzy Hash: 31415C31A00219DBDB29FE1D84D07FABB76EB50755F15806AE94ACB344D6328FC1C791
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e539e0ec8ed27050e536e8604fa60828e668a9aab866a3cceff09e8e2b6e4eba
                                  • Instruction ID: 5e6020e99666445e9e0f54d4465d6535f1c8b94759d47e30af6ee4afd48c576f
                                  • Opcode Fuzzy Hash: e539e0ec8ed27050e536e8604fa60828e668a9aab866a3cceff09e8e2b6e4eba
                                  • Instruction Fuzzy Hash: 65415675A00705EFD721DF1CC840B26BBB5FF58B54F208A2EE849CB251E771EA428B91
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                  • Instruction ID: c887c8c0992c26a7f5b9f07e8b01f82eb82d1afc360ea77fc087be96ad82e3d7
                                  • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                  • Instruction Fuzzy Hash: FD412A75A00705EFDB24CF98C980AAABBF6FF18704B10496DE656DB692D330EA44CF50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27f90e56b05ed86a6a503b03acbf50a31a328fbcc4cd77597ab8db051c3b817c
                                  • Instruction ID: 54a4bdc562c4d822ea04f8edab6e0a5fa70badaf423b3839803dd476a25256be
                                  • Opcode Fuzzy Hash: 27f90e56b05ed86a6a503b03acbf50a31a328fbcc4cd77597ab8db051c3b817c
                                  • Instruction Fuzzy Hash: 53417FB1501709CFCB22EF68C980A55B7B2FF94B14F14816DD50ADB2A1DB30EA41CB52
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1ed5ed65889fa27f6e2576d679b3ee4842959135e3cd82d88e89b4b7f6be2648
                                  • Instruction ID: d3b1f5559ec8f42e48fbdbe3100afeb2bf947335ded3b8484573cfed9745017f
                                  • Opcode Fuzzy Hash: 1ed5ed65889fa27f6e2576d679b3ee4842959135e3cd82d88e89b4b7f6be2648
                                  • Instruction Fuzzy Hash: 81316DB2A00349DFDB12CF98D540B99BBF4FB49714F2085AED119DB251D3369A42CF90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4a9090691732432ecdaf007919564cab525d48a15bec745813911c00cc2a638
                                  • Instruction ID: d9f478f441f5af34ded20da2aee9e9f492392779cf79fccd1e6df11d94600091
                                  • Opcode Fuzzy Hash: a4a9090691732432ecdaf007919564cab525d48a15bec745813911c00cc2a638
                                  • Instruction Fuzzy Hash: D7415B719083159FD720DF29C885F9BBBE8FF88654F004A2EF698D7291D7749904CB92
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9628b78840aa5c6a844982176ad409da45774dac919f097ac7f9658bc88fb392
                                  • Instruction ID: c8bb939d8a3bf59610a1d79d80edb9a5e6edbc13b6a95aa4f760604a86dbc52e
                                  • Opcode Fuzzy Hash: 9628b78840aa5c6a844982176ad409da45774dac919f097ac7f9658bc88fb392
                                  • Instruction Fuzzy Hash: 4341C371A06A1ADFDB11DF58C8C06E8B7B9BF55764F148229D816E7380D734EE418B90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f04eccd008509a638319e22c6f774735264e167f96bbdb2a760b8071e5bdb761
                                  • Instruction ID: 52fb29e73e657300012180a6d2158fd25e3660e71540bcd0f71ef9222445a71b
                                  • Opcode Fuzzy Hash: f04eccd008509a638319e22c6f774735264e167f96bbdb2a760b8071e5bdb761
                                  • Instruction Fuzzy Hash: D041B1726047429FC321DF6CC840EAAB7A9FFC8700F18061DFA5997680E734E904C7A6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0ff115edefb9d4dfa91b61e595c1f776fd71940818d16c1bd2e1e54ba5a41647
                                  • Instruction ID: 80b3da0e7f14a272c355e782249e6feb975b750a209f69a306d36971dde357ab
                                  • Opcode Fuzzy Hash: 0ff115edefb9d4dfa91b61e595c1f776fd71940818d16c1bd2e1e54ba5a41647
                                  • Instruction Fuzzy Hash: 6441D7706043128BD725DF2CD8A4B66BBEAFF80B54F14452DFA46C72A1D730DA85CB52
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 48bfca60eea102dce9df61e6301465192f8f89c59ae73804a8db20b153a85ed7
                                  • Instruction ID: ab34426f4af94a1fbce0170480f901d6b96d9fc5d30dc83d9384bb29fcb63272
                                  • Opcode Fuzzy Hash: 48bfca60eea102dce9df61e6301465192f8f89c59ae73804a8db20b153a85ed7
                                  • Instruction Fuzzy Hash: 0841A0B1A016098FCB15DF6DC9809DDBBF6FF89724B10866ED46AE7360D734AA41CB40
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                  • Instruction ID: 9d81b3fcbd777a744b4579bdefe12efe22fc5456d5b4d52ebcab6b646dfcc6cb
                                  • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                  • Instruction Fuzzy Hash: BC310231A04348ABDB228B6CCC40BDBBFE9EF54754F0441A9F819D7252CA74DA84CBA1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8924b1b075439eaf5cfdd05527ffedec3a7e28d7e5a4660a024ec41e9e87b6c4
                                  • Instruction ID: 39f390077fbdb5437d027d34621d9e63cf8d029ba7dd2951e570b76ce0a4e6e9
                                  • Opcode Fuzzy Hash: 8924b1b075439eaf5cfdd05527ffedec3a7e28d7e5a4660a024ec41e9e87b6c4
                                  • Instruction Fuzzy Hash: AA31A87574071AABD722DF698C81FAB77B9AB59F50F000028FA04EB2D1DAA4DD00C7A1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 21e563d1886dc1e5af8e7097dd608d3f3f9c676c6e52d6814422b374fcaeb496
                                  • Instruction ID: 495bce5f32d4c33a63baf7a99da12c24126b614defe0872afe9f8fe86c6cd965
                                  • Opcode Fuzzy Hash: 21e563d1886dc1e5af8e7097dd608d3f3f9c676c6e52d6814422b374fcaeb496
                                  • Instruction Fuzzy Hash: 0231A172A092018FC321DF1DD981E6AB7FAFF85361F09446DE9998B256D730AC40CF95
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5aade4516d0c660c28c9c8612fe6e00d9181a816ee0fcdc2e70756896994df5b
                                  • Instruction ID: d0ca1f273d6b725043da5de7b36e9e532e5562f62a16a447a2f46edb9da4b418
                                  • Opcode Fuzzy Hash: 5aade4516d0c660c28c9c8612fe6e00d9181a816ee0fcdc2e70756896994df5b
                                  • Instruction Fuzzy Hash: A641AE31200B45DFD722CF28C995FD67BE9BB55714F14442EE699CB250C774E944CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8b872bef097ccfb575a189c5396256f41fd41471e758493f087c5d81db9a0b3a
                                  • Instruction ID: 2a68f080c10ade1c6be29a73613fb037ab3a565a62dd5800c8ad93acc37842d1
                                  • Opcode Fuzzy Hash: 8b872bef097ccfb575a189c5396256f41fd41471e758493f087c5d81db9a0b3a
                                  • Instruction Fuzzy Hash: 52316D71A042018FD720DF28C981E6AB7E9FF84710F09496DF9599B256E730ED44CB96
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3883ae4c5b1f2b1d45a62be1fe01e1a4a80b8e48edcf50d669a909c54f431fa7
                                  • Instruction ID: 4cf4067c56622082bf9bfeeb8b7581922db1bc89603a70ed2a6dfeba30f66aa1
                                  • Opcode Fuzzy Hash: 3883ae4c5b1f2b1d45a62be1fe01e1a4a80b8e48edcf50d669a909c54f431fa7
                                  • Instruction Fuzzy Hash: 8431D2716416869BF32B575ECD48F657BECFB80741F1D00A0AF49DB6D2DB28D841C622
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c150fdeb1f63e7c875ec09d8a7db48a1e1c6cc80862e840ad54c629a8f88162c
                                  • Instruction ID: 47e6b1a7c9557c0004f10a6c1ac87c10c25fcd38292029870805968fe349279d
                                  • Opcode Fuzzy Hash: c150fdeb1f63e7c875ec09d8a7db48a1e1c6cc80862e840ad54c629a8f88162c
                                  • Instruction Fuzzy Hash: DB319475A00256EFDB15DF98C840FAEB7B9FB44740F4541A9E904EF284D770AD41CB94
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 95cf3f2cae91c3e70d2af16b8d4e36ecf95e5aed19fd6823baacff555d906e3c
                                  • Instruction ID: 722c4f268b0be8c1f80d47c9ff37d16c26eaf3d817c8019c51df613c5869908b
                                  • Opcode Fuzzy Hash: 95cf3f2cae91c3e70d2af16b8d4e36ecf95e5aed19fd6823baacff555d906e3c
                                  • Instruction Fuzzy Hash: 1D316576A4112DABCF21DF98DD84BDE7BB9AB98750F1000A5A50CA7250DA30DE91CFA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 333b711f59617f40ab32abff638915fbb480e275b6200e14e26040c2e2608e3f
                                  • Instruction ID: 3a22f0f378ced067e9dd992a5fa38a7d3955047dd15db4f3c6c231587d9edee9
                                  • Opcode Fuzzy Hash: 333b711f59617f40ab32abff638915fbb480e275b6200e14e26040c2e2608e3f
                                  • Instruction Fuzzy Hash: 6431B372E00219AFDB21DFADC844AAEBBF9EF45750F014425E916E7250D3709F008BA1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 108ace2d28a36a589eff158aa5d9f3cefb66208159f77f075090a257d285bb27
                                  • Instruction ID: ede0b1953c13e971cd4a6b76d83c69885a996ace243977f77af1404db93b57f2
                                  • Opcode Fuzzy Hash: 108ace2d28a36a589eff158aa5d9f3cefb66208159f77f075090a257d285bb27
                                  • Instruction Fuzzy Hash: 0B31C571A40606AFDB12EF9DC990F6AB7BABF84754F044569E50ADF342DA30DD018B90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e820948b573eace72891d91d140c99c45edc2f349814ed89a3aa8f3846d8e669
                                  • Instruction ID: ec761225e11311f3dcc8b18d4d445ae78f13a1fd05bcc3e477108404ce48daa9
                                  • Opcode Fuzzy Hash: e820948b573eace72891d91d140c99c45edc2f349814ed89a3aa8f3846d8e669
                                  • Instruction Fuzzy Hash: DC31E876A04716DBC712DE688C80A6B7BA5EFD4B90F01852DFD59E7311DA30DE018BE2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c01b87e018ec35263181b020b20dbd0e575088eff05a60450997639397cece8
                                  • Instruction ID: fa061a5dbc40c524eb2840f140038d0bdb66b277482999c19d3004edb9d07e15
                                  • Opcode Fuzzy Hash: 3c01b87e018ec35263181b020b20dbd0e575088eff05a60450997639397cece8
                                  • Instruction Fuzzy Hash: B831BA716493118FE720CF19C840B6ABBE9FB98B00F044A6DF988D7354D7B5E944CBA2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                  • Instruction ID: 01f563da62aa975a88d43911519e3f45ca151f5073516239ab4b133d94cf74ed
                                  • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                  • Instruction Fuzzy Hash: A6310CB2B04B01AFD765CF6DDD41B57BBF8AB48B50F14452DA69EC3651E630EA008B60
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3a00819269d26b1c9135262bafb1aae0053584a7b324fe9300e8000f7eba2d8
                                  • Instruction ID: 513081315052dbfd2b385cef7a2aaf552f35c947d8b83bdc6c477a0666427ae4
                                  • Opcode Fuzzy Hash: d3a00819269d26b1c9135262bafb1aae0053584a7b324fe9300e8000f7eba2d8
                                  • Instruction Fuzzy Hash: B231CCB5909301CFCB11DF19C68095ABBFAFF89714F4449AEE48C9B215D330EA44CBA2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 320ffe100231ee7e4210bc664c8b528be5fb91bb4bd2135ff3f4f416a51ec34a
                                  • Instruction ID: bafc4dadb0fcf3861adb83da1fd1f7018f8eacf68376445f63ecadcdeaf79033
                                  • Opcode Fuzzy Hash: 320ffe100231ee7e4210bc664c8b528be5fb91bb4bd2135ff3f4f416a51ec34a
                                  • Instruction Fuzzy Hash: 5131F431B012069FD720EFA8C9C9A6EBBF9BB85308F00842AD51AD3255D730EB41CB91
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                  • Instruction ID: 8ca33ad417571ded5758b432a43fcc1cccad0de4957e4dd215fd0cd4a08c718e
                                  • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                  • Instruction Fuzzy Hash: 6E210672E0125FAADB11DBB98851BEFBBB9AF14740F0580359E59EB340E370DE4187A1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c5351a8ec79a6a21b7591b02bac2993f5f2e52b16f700e938da88ae18dafec1
                                  • Instruction ID: c0c6a6eef8fcd3d54de90f910d0f22fddd8d4879345dce07422eef2e81f9a355
                                  • Opcode Fuzzy Hash: 3c5351a8ec79a6a21b7591b02bac2993f5f2e52b16f700e938da88ae18dafec1
                                  • Instruction Fuzzy Hash: 54315BB25003058BDB21AF6CCC84BA977B8AF51304F44866DED4DDB346EA34EAC1CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                  • Instruction ID: 6b5788cb6eb7bfa0fdd72e1bbe580707bca16d370d40e8203b68ea1210f68f99
                                  • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                  • Instruction Fuzzy Hash: 33212D3A60065776CB15AF958C00ABBBBB4EF80B11F40841AFA6D87691F634D940C3A1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f8cdafcee3b3c947dc4a7cd5c1ac080f240cd9f93bbcf9bb64479f2681dd2623
                                  • Instruction ID: 56e64788458048a5197f54a72f1f87c00e39c4b9ff588f168319ff94771b9a99
                                  • Opcode Fuzzy Hash: f8cdafcee3b3c947dc4a7cd5c1ac080f240cd9f93bbcf9bb64479f2681dd2623
                                  • Instruction Fuzzy Hash: 94319132A4152C9FDB319B18CCC1BEA77B9AB15740F0101A5E645E7290D6B4AF808FA1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                  • Instruction ID: 983937c03535c383ffffde82f284d5b6f4f254015e6b1b15baed2ee112a7f1c2
                                  • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                  • Instruction Fuzzy Hash: C6217F32A00609EFDB15DF58C980A8FBBB5FF48724F10806AEE19DB241D675EB058B90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 58caec6bd168b05bdd7f4adb0f8b6193da8d523a91359fad23023683a2fa668e
                                  • Instruction ID: 4aa823c39b15a556c0de7c4f53759a9499ce1771d6ad06b6a6730778f09843aa
                                  • Opcode Fuzzy Hash: 58caec6bd168b05bdd7f4adb0f8b6193da8d523a91359fad23023683a2fa668e
                                  • Instruction Fuzzy Hash: C221A0726047599BC722DF58C884B6BB7E4FF8C764F01451EFA589B641D730EA008BA2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                  • Instruction ID: c3d9a36409e538ef76d4751379239b55ef62e51ea20d8f732bbc2e92d021c462
                                  • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                  • Instruction Fuzzy Hash: 09318831600A09AFE721CB68C884FAAB7F9EF85354F1045A9E516DB391E734EA41CB51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12561a867aa4b82d2d200ea42c9e72088975567e03b87eb97f7360f04515ede9
                                  • Instruction ID: 0bdd236195a4702929cb77a4c90a2d211de52532e37d777257cca18d9254924d
                                  • Opcode Fuzzy Hash: 12561a867aa4b82d2d200ea42c9e72088975567e03b87eb97f7360f04515ede9
                                  • Instruction Fuzzy Hash: 5C315A79A0020A9FCB15CF18C9849AEB7B9FFC8308B154459F80A9B391E771FE50CB95
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d2d096fc6f5057baff26fca9a63629cff97f2b083aca542690a73996dff5e4d
                                  • Instruction ID: b04d37cff6c17ace337b5cd3359dee33ad98a1eec4ca1fe44b8a5e2a0709f8e6
                                  • Opcode Fuzzy Hash: 5d2d096fc6f5057baff26fca9a63629cff97f2b083aca542690a73996dff5e4d
                                  • Instruction Fuzzy Hash: 8E218075A006299BCF21DF59C881ABEB7F8FF48740F550069F945E7250D738AE41CBA1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f0a6f7e0fcf189d18c8b038ee7567818b9799d20efca8db965502aa0acbcaaa2
                                  • Instruction ID: e7374c93ade167ee7cf358777bbac4b5ff524b85bbfae4ea91bc6a1cc141630e
                                  • Opcode Fuzzy Hash: f0a6f7e0fcf189d18c8b038ee7567818b9799d20efca8db965502aa0acbcaaa2
                                  • Instruction Fuzzy Hash: 8521AE71A00645AFD715DB6DC980F6AB7B8FF88740F180069FA08D76A0D638EE40CBA5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d86bc23aa1f5d7d6d190d777d5af30ee64f38c7955d77ef3beb381ecc87836d
                                  • Instruction ID: bec93c377ae46a009ed6d06a1e649db345e49ef1b9ffc676d953af96359a2284
                                  • Opcode Fuzzy Hash: 8d86bc23aa1f5d7d6d190d777d5af30ee64f38c7955d77ef3beb381ecc87836d
                                  • Instruction Fuzzy Hash: 5C21B3B29047469BD711DF5DC844F9BBBDCAF91344F0C0856BE88C7251D734DA04C6A2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bef453dda119b2df60279ad5b91307b922656d9d7d2c9b1a5b43651ce1a211b2
                                  • Instruction ID: e0eafc599e6c107651420d8918247e25dabacf4d92e5d22afa5b8f8884b46dcb
                                  • Opcode Fuzzy Hash: bef453dda119b2df60279ad5b91307b922656d9d7d2c9b1a5b43651ce1a211b2
                                  • Instruction Fuzzy Hash: 9E210B326456A59BF322576C8C08F247BD9AF42B74F1803A4FE24DBAE2DB6CD9018641
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3df127983577ef2b871d3899866fb2962e89f7fabbf2745d3728bbcccf7c2465
                                  • Instruction ID: 2b9bf80b1bf6581bd74395dd81b45bcd96289cadc0a3c7b2f0683d280d59f326
                                  • Opcode Fuzzy Hash: 3df127983577ef2b871d3899866fb2962e89f7fabbf2745d3728bbcccf7c2465
                                  • Instruction Fuzzy Hash: D0219A79200701ABC729DF29C940B46B7F5EF48B54F14846CA509CB761E331EA42CB95
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b6ac7b319f9925102721911cd170d37820a4eb2334f70d1704461f3e6330ad1b
                                  • Instruction ID: 3b3e8d11aff5ed5a78a60f55b5c2001892acc62d335477bba71c45fa065bfe99
                                  • Opcode Fuzzy Hash: b6ac7b319f9925102721911cd170d37820a4eb2334f70d1704461f3e6330ad1b
                                  • Instruction Fuzzy Hash: DB110672380A16BFE32256599C01F2F7A99DFD5B60F194428B70CCB280EB70DD018796
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 457bad0f8e2d83bf125c6c69620d1961955716b53ec8f5163fcff80d3e351b9b
                                  • Instruction ID: e104cabd2178fdc0635d581f6aad1abb710d34089883acc36337287b37b0d7fd
                                  • Opcode Fuzzy Hash: 457bad0f8e2d83bf125c6c69620d1961955716b53ec8f5163fcff80d3e351b9b
                                  • Instruction Fuzzy Hash: D021E5B1E01219ABDB24DFAAD9819EEFBF8FF98700F10012EE509A7240D7749A41CB54
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                  • Instruction ID: 2c9d159ba2b3dafe4f98b3591b35f9d2093f894b06c1b6081f3050e2768fd3ca
                                  • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                  • Instruction Fuzzy Hash: D5216A72A0020AAFDB12DF99CC40BAEBBB9FF88311F204819F908A7251D734DA509B50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                  • Instruction ID: d6fdf23606baf6eac851f99982b5998a97ab493a98bd353727cfb49514e9faa6
                                  • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                  • Instruction Fuzzy Hash: 6211B272601A05AFD7229B58CC81F9ABBB9EB84754F10402DF704DB191D671EE84CB65
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b33f116fcf13c1e902bd7481d01cb6f25ee4c8445d696c74f31949ab2bafa1fc
                                  • Instruction ID: bfd607f728293443ccbcfba81068c299298d5811ab578d7591137ae7a030adeb
                                  • Opcode Fuzzy Hash: b33f116fcf13c1e902bd7481d01cb6f25ee4c8445d696c74f31949ab2bafa1fc
                                  • Instruction Fuzzy Hash: 5E11BF317406259FDB11CF4DC5C0A66BBE9EF8BB10B18806DEE08DF204E6B2EA018790
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                  • Instruction ID: 099199e6e01591d70e9509ec193f16720bf9ead5d6bc78ac39ffd45aee3fb8f6
                                  • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                  • Instruction Fuzzy Hash: 7321A972600609DFD7299F49C540A26BBE6EF94B20F10883DEA4AC7614C731EE00CB80
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e16471aa0f128b961e3cd888db01b42c61e772e2e4c1cb05ae5b105dfb761662
                                  • Instruction ID: 1e81efe8067aaa80529105a43e6e47866afe08b36ba750f27a160bc101ebc95d
                                  • Opcode Fuzzy Hash: e16471aa0f128b961e3cd888db01b42c61e772e2e4c1cb05ae5b105dfb761662
                                  • Instruction Fuzzy Hash: 7E215E76A40609DFCB14CF58C591A6EBBF5FB89718F24416ED105AB311C771EE06CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e477a7a6e743a38ee2fee78af07f9e47d3a3817bb2a4bf7a91d79f6b92c8fb32
                                  • Instruction ID: 892719a2f66a7c40b10f17aa206fc3c04ffc0707d1c5b610ae77b535ac15ccc2
                                  • Opcode Fuzzy Hash: e477a7a6e743a38ee2fee78af07f9e47d3a3817bb2a4bf7a91d79f6b92c8fb32
                                  • Instruction Fuzzy Hash: 74219375510B00EFD7209F69C880F66B7F8FF44350F10852DE69AC7250EA30B940CB91
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6fb0bd8574bf66a44c9ff69de0980ec15599edd04de10d6e11921b73a3f0325d
                                  • Instruction ID: b9cb3e14cb6ac0ca7d6509f928f4d02febfe8e422e4e1259b6e3e1e4153190e3
                                  • Opcode Fuzzy Hash: 6fb0bd8574bf66a44c9ff69de0980ec15599edd04de10d6e11921b73a3f0325d
                                  • Instruction Fuzzy Hash: 44110C737002145BCB19DB29CDC5A6B72E7EBD6374B354529D926CB254E9309901C291
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2dfef4903f25a72ef6213e2811ba362864c95503a8ee6687dfc183a5aed8147a
                                  • Instruction ID: f366412f9b0410d2eab57a04e7645c125b8f10d3353354e695703d0aa5835c11
                                  • Opcode Fuzzy Hash: 2dfef4903f25a72ef6213e2811ba362864c95503a8ee6687dfc183a5aed8147a
                                  • Instruction Fuzzy Hash: 09110672240605EFC762DB5DCD50F9A77B8EF95B61F414025FA09EB260DA70ED01C791
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 35c8078beb39dabcb278e453c07fc5ad6945bcd11c34e70894d95509f42b1eca
                                  • Instruction ID: 390f808afc07f5a959f21465923507357d82b2fc7ae063e75afc1102ea777e7b
                                  • Opcode Fuzzy Hash: 35c8078beb39dabcb278e453c07fc5ad6945bcd11c34e70894d95509f42b1eca
                                  • Instruction Fuzzy Hash: A011BC76A01205ABCB25CF59C580A5ABBF9AF84710B21827DEA05DB311F730EE00CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                  • Instruction ID: 07608fb495a101860d2a7db1a4692fd8232b8e5844cb0958406798be95f3a614
                                  • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                  • Instruction Fuzzy Hash: FA11E236A00905AFDB19DB58C805F9DBBF5EF84210F058269E84AA7340E632AE01CB80
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                  • Instruction ID: 9e60e6a07d68f4de3dbeabcc58784b9a8cfd99625c7fe30a0994a2786ddb90ac
                                  • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                  • Instruction Fuzzy Hash: 122106B5A00B059FD3A0CF29C440B52BBF4FB48B10F10492EE98AC7B40E371E914CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                  • Instruction ID: 5774701edc5ffc0a18b551179243e1305a301ed0218d635d9ccfe695d87a9280
                                  • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                  • Instruction Fuzzy Hash: 91119E32A00601EFFB259F58C844F56BBB9FF85755F058828EA0D9B260DB39DD40DB92
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b5ff76062dcabb71f42d9e2fa9277d46cfa749331122211c165ce4e6c456642f
                                  • Instruction ID: d277dac1b2b4de44b2a9d2a8c53548d8d336493fd35d62dd2623acdf964bb4b5
                                  • Opcode Fuzzy Hash: b5ff76062dcabb71f42d9e2fa9277d46cfa749331122211c165ce4e6c456642f
                                  • Instruction Fuzzy Hash: A1012673605659ABE316A36EDC88F677BCDEF81355F090074F905CB641DA24DD00C2A2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc06296cbb76aed31a8f016706fb7a985a8c62e2f5f5641e760d18e593681616
                                  • Instruction ID: 625dbb2d9bdedced11fbca7da4afa6d18e761836dee027043d3a42c45565b5d3
                                  • Opcode Fuzzy Hash: fc06296cbb76aed31a8f016706fb7a985a8c62e2f5f5641e760d18e593681616
                                  • Instruction Fuzzy Hash: 41110E36204649AFDB21CF5DD990F567BA8EB96F64F04411EF909CB251C370EA80CF60
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 550a4c324a2a2a39aaa31f0d809ae3fb4aab6c25675113f09356ba66c58b641a
                                  • Instruction ID: 2ef22e885a7d34115f875d1474f8d65d715ad72fc61533a442be4798e6ffe923
                                  • Opcode Fuzzy Hash: 550a4c324a2a2a39aaa31f0d809ae3fb4aab6c25675113f09356ba66c58b641a
                                  • Instruction Fuzzy Hash: 3C112936200A019FDB23DA2DD944F1BB7A9FFC4311F144429EA4AC7750DA30E803CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5380e34e8a57144b23b6dec6a23e5089bb09001decb099f731d950dd011a71de
                                  • Instruction ID: b9f6f17d00da92897f7482de722a2f13eba5ff733d1be32497dc1c6491b9afff
                                  • Opcode Fuzzy Hash: 5380e34e8a57144b23b6dec6a23e5089bb09001decb099f731d950dd011a71de
                                  • Instruction Fuzzy Hash: 3C117072A00715ABDB219B5DC9C0B5EFBB8EF44B50F650559DA05E7200E738AE018B51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eab47d9657954b75badd4d1b95b8885813663cd7d0e43b3bb0d59a4443599d07
                                  • Instruction ID: a55b347d94a86e17185ffe3b3c0ab365cdb467aec3d0d8445b2261c71a23162b
                                  • Opcode Fuzzy Hash: eab47d9657954b75badd4d1b95b8885813663cd7d0e43b3bb0d59a4443599d07
                                  • Instruction Fuzzy Hash: 9201D2715002099FE725DB18E588F16BBFAEBD2714F25826EE104CB261C770ED42CB94
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                  • Instruction ID: e8c8ffdf86119629d232c30f4c2f6dd679ced2995800feed906456687f13418f
                                  • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                  • Instruction Fuzzy Hash: 3011E5762017D69BE723972CC958B253BE8AB01748F1900E0EE45D7686F328C942C652
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                  • Instruction ID: 6062a768f900c28804aee1244aee975e18d50b04804d0980b279cf3112659aae
                                  • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                  • Instruction Fuzzy Hash: BF01D232A00206EFE721DF58C800F5ABBADFB80B61F058464EA0D9B260E779DD40C790
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                  • Instruction ID: c0698e69ae311fa94e2272312c06a1faab9cb4572b805c91eeda7013c9fd4b34
                                  • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                  • Instruction Fuzzy Hash: D1012631504B259BDB358F19D880AB27BB4EF55B60B00852DFC95CB381D331D604CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d19d414bdda88065c8a331cff33ac1d2e0c994cffccd83fd363e54f6bcea780c
                                  • Instruction ID: 575eca0eef7d45ee33a5b64bacab25933c484a937fc10c3fa428f23c14b5aebc
                                  • Opcode Fuzzy Hash: d19d414bdda88065c8a331cff33ac1d2e0c994cffccd83fd363e54f6bcea780c
                                  • Instruction Fuzzy Hash: CC0122734412019FCB33DF1CCA40E12B7ACEB81B71B254225E9AC9B1A2D730E802CBC1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7da19cd60c44170ab7d11c329c33b290d572fe53e342b885d08e2f7ccdf5c06
                                  • Instruction ID: 1d2fe6fb425449bacd6d14264ed5cbbf2f516741439b1b75d1edfc2fef462e9d
                                  • Opcode Fuzzy Hash: c7da19cd60c44170ab7d11c329c33b290d572fe53e342b885d08e2f7ccdf5c06
                                  • Instruction Fuzzy Hash: 1711A131241241EFDB15EF19CD80F567BB8FF94B44F100065E909DB651C635ED01CA90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61f460f315ce87463f33853e40a604332f1891aee041a64b976839a7b9e10737
                                  • Instruction ID: 7700385b606f1ef24f2481e75655ce662f9772b755ffe1e21d46968080517480
                                  • Opcode Fuzzy Hash: 61f460f315ce87463f33853e40a604332f1891aee041a64b976839a7b9e10737
                                  • Instruction Fuzzy Hash: F4115A71541229AFDB26EB68CD46FE9B3B4AF44710F5041A8A318E61E0DB709E81CF85
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                  • Instruction ID: add89e870c70f4a38a6b41364a1efa72429ea3aff2c8dad2106600a121d28a3b
                                  • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                  • Instruction Fuzzy Hash: E2014732600215CBEF128E2DD880B92776BBFC4B04F1581AAED09CF28ADA71CD81C790
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: edd5d32e80e851634102529e4f8f124f5c47c164b06d355b5ad2071c3cfb37f0
                                  • Instruction ID: 4dc80039695eb97d2f45a82d8494eb0ff669a4a0929dd1de776b450f0c56b71e
                                  • Opcode Fuzzy Hash: edd5d32e80e851634102529e4f8f124f5c47c164b06d355b5ad2071c3cfb37f0
                                  • Instruction Fuzzy Hash: 461129B3900119ABCB16DB99CC80EDFBB7CEF48354F044166E906E7211EA34EA15CBE1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e7110d3472c04472113dd0a80222d28a98a61bc2f968a223ca6d2fa61ecda77
                                  • Instruction ID: 7a3da3b4a0fcfe70673b4fef3cef1348e3d4c3a3f694284482b1d5415a9d9849
                                  • Opcode Fuzzy Hash: 1e7110d3472c04472113dd0a80222d28a98a61bc2f968a223ca6d2fa61ecda77
                                  • Instruction Fuzzy Hash: E611C8326441459FD751CF58D440BA5BBB9FB56318F488159EC48DB315D731EC42CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 91f16bd0269e77b55977c341598d76d00d9bbe4ed5fb03e860dc4d93891b1700
                                  • Instruction ID: bd49612ce9c8197600f55cb6b7ea49ef1714b5a2e794a12fd3c2f0cc366e101d
                                  • Opcode Fuzzy Hash: 91f16bd0269e77b55977c341598d76d00d9bbe4ed5fb03e860dc4d93891b1700
                                  • Instruction Fuzzy Hash: AA11E8B1E012199FCB04DFA9D581AAEBBF8FF58350F10406AA905E7351D674EA018BA5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4fd2cf7318fc5a9979eaf1fb7688d123e3ca02cc32d5d361c2f412922b15380
                                  • Instruction ID: 530c6c04a7dcda58e8a83f5f5c973707e58e6187afc48d09db3803ccdc05baba
                                  • Opcode Fuzzy Hash: b4fd2cf7318fc5a9979eaf1fb7688d123e3ca02cc32d5d361c2f412922b15380
                                  • Instruction Fuzzy Hash: 55118075A0120DAFDB06DFA4C855FAE7BB9FF84340F004059FA0997290DA35AE11CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                  • Instruction ID: 94127028c1f9aa927ac2ab88021f41b411f24450a52dd7add7eac5d35aa13131
                                  • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                  • Instruction Fuzzy Hash: 53012D321007099FEB22966DC544FA777EDFFC5314F044419A556CB644DB70F542C751
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ee6fe3aed8d12b840ba413c3744e81a68d7a32984d3c8fed4c2a8245b4f32ca
                                  • Instruction ID: 5c733ab3a39af5c54a0f42e0584f80353cd5c7b8b786fe87ade99934684905fa
                                  • Opcode Fuzzy Hash: 7ee6fe3aed8d12b840ba413c3744e81a68d7a32984d3c8fed4c2a8245b4f32ca
                                  • Instruction Fuzzy Hash: 9301D4B1200A017BC211BB2DCD84E53B7BCFB957547000629B609C3561DB64ED01C6A1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34828034918f32260ed458878271100a4e2937bc1af04a3793a546cf4e825b1e
                                  • Instruction ID: 609eb816c3ede2fb7ef1b34eb38cf3813c48ab44bf4f9656e4c9c19962d7c7d5
                                  • Opcode Fuzzy Hash: 34828034918f32260ed458878271100a4e2937bc1af04a3793a546cf4e825b1e
                                  • Instruction Fuzzy Hash: E001D8322156129FD360DF6A88889A6BBA8EB94760F514629ED5D971C0E7309901C7D1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7bad362b16e5bf474fbdfad7fd44dfb285d446e925e8376e2ade9660fe4ac6d0
                                  • Instruction ID: 70fcd994ae5129360efa3076eccea888a758ca2f84293859702ca7e124653ddf
                                  • Opcode Fuzzy Hash: 7bad362b16e5bf474fbdfad7fd44dfb285d446e925e8376e2ade9660fe4ac6d0
                                  • Instruction Fuzzy Hash: 22116D75A0220DEFDB15EFA8C940EAE7BB9FB88740F004059FD0597380DA34EA11CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6a7c64210397b7cc359b96d29a87e9b58fd3dab202cec7e2dad86930905bd3e6
                                  • Instruction ID: c3b7bc4c953eef48f1a2e2293a72246a99f216464b06315b9982ad6c62f5f730
                                  • Opcode Fuzzy Hash: 6a7c64210397b7cc359b96d29a87e9b58fd3dab202cec7e2dad86930905bd3e6
                                  • Instruction Fuzzy Hash: 58113CB56193059FC700DF69D44195BBBE4EF98710F00451EB998D7391E630E900CB92
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                  • Instruction ID: a7b18a625fce12b38ce880140ffdcd07e4f985ecf660df8bd621a2c716ba9172
                                  • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                  • Instruction Fuzzy Hash: 830128322016029FDF228A5DC944F52B7EAFBC1200F044859E646CB650DA74F842C750
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1cfb0aae2a051835ae665d5e7074bcf8d42181fb2d188c605a24546908935546
                                  • Instruction ID: 34b2561bf471f700ebd3bc5e4bfdd4a3b3883dbdeddb05c6d1fc0304c48a4909
                                  • Opcode Fuzzy Hash: 1cfb0aae2a051835ae665d5e7074bcf8d42181fb2d188c605a24546908935546
                                  • Instruction Fuzzy Hash: 321139B1A1A3099FC710DF69D441A5BBBE8FF99750F00891AB958D73A0E630E900CB92
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                  • Instruction ID: 533f7eeead0e5c4b2e5177566c30f6482dd0c7d6dcccfbe7b2b2549e05840d19
                                  • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                  • Instruction Fuzzy Hash: C4018F722006889FE326871DC958F2A7BDCFF44754F0D44A1F909CFA91D638DD81C661
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc1b3ebfa62c8120d91c5e59a6b4eb4c9d5e67675f2399496b2d8873d8fc528f
                                  • Instruction ID: b4fd30ed8f5c0b94dd80e8ac7d70781872421c179d6288411434a88df8dda238
                                  • Opcode Fuzzy Hash: dc1b3ebfa62c8120d91c5e59a6b4eb4c9d5e67675f2399496b2d8873d8fc528f
                                  • Instruction Fuzzy Hash: 6E01DF32611A099FD714EB6AD9859EEB7ADEF81310F0540299A0AE7780EE30EA01C690
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 2305917e6695a61f3ab9b6c077ab45575cc43e7a1180a2fe5c6dbd4432d21495
                                  • Instruction ID: afcdef1d673e7a33cee51df8c181589a68ddd3bd8443e776fcd31c6e26ba2c2f
                                  • Opcode Fuzzy Hash: 2305917e6695a61f3ab9b6c077ab45575cc43e7a1180a2fe5c6dbd4432d21495
                                  • Instruction Fuzzy Hash: 8A01A271284705AFD331DF2AD980F56BBBDEF55F50F11482AB60A9F390D6B09940CB64
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c0fae7c7bdb6cf3ec6f00b3ca1f712fda18319ad45a624fa7d3ce477f5272237
                                  • Instruction ID: e610d5514d057effd894320e56d4a8fc0df7b70822736478af64214e5eee4735
                                  • Opcode Fuzzy Hash: c0fae7c7bdb6cf3ec6f00b3ca1f712fda18319ad45a624fa7d3ce477f5272237
                                  • Instruction Fuzzy Hash: DFF0A932741715B7C7319B5A8D40F577BAEEF94F90F15442DB605D7640D630EE01C6A1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                  • Instruction ID: c742a5c4d9d0dee1b987608c85cf54a76d09880dac525f82c70bd9f5a4595bea
                                  • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                  • Instruction Fuzzy Hash: 11F0C2B2A00611ABD324CF4DDC40E57FBFADBD1B80F048129E509C7220EA31DE04CB90
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                  • Instruction ID: b8c7fc4799a2aa8eaec1781fa44577012433577afabb517ab9454a4381f80945
                                  • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                  • Instruction Fuzzy Hash: 92F021732066339BD732565D48C0BEBA6958FD9B64F590036F209DB304CB649F0157D1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6df1c43051fee63721793db47da1d4066c41b8eceb739d98c43c1821fa939fb3
                                  • Instruction ID: 42ca908aaa6ed9bec44ad49a3b6b2225648933105cd4f17ff0f3a97df3798e29
                                  • Opcode Fuzzy Hash: 6df1c43051fee63721793db47da1d4066c41b8eceb739d98c43c1821fa939fb3
                                  • Instruction Fuzzy Hash: 59012C71E11209AFDB04DFA9D551AAEB7F8FF98304F10406AE905E7390D6749A018BA1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3906bc13f8ffebe8550511bb943c3c01d8b5a963cd609d5f74bab1003ee59f5e
                                  • Instruction ID: 4c2cd2dd7014c3bebaa837ad3aa1e59596ecc9630c3cf2c3ec3d24644b54e80b
                                  • Opcode Fuzzy Hash: 3906bc13f8ffebe8550511bb943c3c01d8b5a963cd609d5f74bab1003ee59f5e
                                  • Instruction Fuzzy Hash: 15012CB1E01209AFDB04DFA9D541AAEBBF8EF58344F50406AEA15E7390D6749A018BA1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bf9669c4fd8d3f1142d07face597af73ad8efc4c95e46f2836ccb95842e01b78
                                  • Instruction ID: 814b7cb5cfd1708994026ce0765922ab8b0a9f357b51f99df64da83d95ca9441
                                  • Opcode Fuzzy Hash: bf9669c4fd8d3f1142d07face597af73ad8efc4c95e46f2836ccb95842e01b78
                                  • Instruction Fuzzy Hash: 34012C71E1121AAFCB04DFA9D551AAEB7F8EF98304F10406AF905E7391D674AA018BA1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d22540b737312072bbd2b29d2b306d403d8dda4de8799969b220ccd0848560e1
                                  • Instruction ID: dd157e48d92152956ec8a0c8afff0596e2dfe041a2b3e230b260f563904c3e98
                                  • Opcode Fuzzy Hash: d22540b737312072bbd2b29d2b306d403d8dda4de8799969b220ccd0848560e1
                                  • Instruction Fuzzy Hash: 1D017C71A012499FCB00DFA9D441EEEBBB8AF58710F14005AE905E7280D734AA01CBA5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                  • Instruction ID: 0132a4cdaee3e1b9fbaf21f29fe6fc0a3277798d3541eb01eda25e7571269d01
                                  • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                  • Instruction Fuzzy Hash: CBF01DB220011DBFEF019F95DD80DEF7BBEEB59798B104125FA1592160D631DE21ABA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b75dd0c0cd1474b3fdb059ce80ab933437f9ddffa2d7959212638cca15f260bf
                                  • Instruction ID: ba06478f4c0724d21ae174ef73a266955682ae8257c4fd984c534a01bf4a9396
                                  • Opcode Fuzzy Hash: b75dd0c0cd1474b3fdb059ce80ab933437f9ddffa2d7959212638cca15f260bf
                                  • Instruction Fuzzy Hash: 82018536110209ABCF129E84D940EDE3F6AFB4C664F068105FE1966220C332D970EF81
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9f148212885d27b310c165245c5b227ccf6797242f5bbe9911594cb1f1407d76
                                  • Instruction ID: 4ce148071a373c7df03bc4bdf9827abd1a3cd28c09edd910cf587a8fff452b92
                                  • Opcode Fuzzy Hash: 9f148212885d27b310c165245c5b227ccf6797242f5bbe9911594cb1f1407d76
                                  • Instruction Fuzzy Hash: D5F024712546456BF76496198C81BA3329AE7C0750F29802AEB09DF3C1FB70EE0187A4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 60ac4dccf2790bf4afddcccd7a87c4524160d1698d6ad78c993e223438f8c921
                                  • Instruction ID: dba94b0b07e5d002f15afd37e853ac726a76c2d478b50c3cc63808633f137010
                                  • Opcode Fuzzy Hash: 60ac4dccf2790bf4afddcccd7a87c4524160d1698d6ad78c993e223438f8c921
                                  • Instruction Fuzzy Hash: 8D0181B0244A859BF322973CCE4CF2537A8BB84B04F690694BA15EB6D6E728D5018611
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                  • Instruction ID: aee2f6a4ae1b4dbdc749798fc0ee8e81dec31817e749e30309d58d9e99cd0079
                                  • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                  • Instruction Fuzzy Hash: 85F0E935381A1347EB35AAAD8620F2AAA9E9F90E02B05052D9609CB640DF20D80087A0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 828ff84207eb433cf9a696bb86e68d300887286fcb0314d35b55536c6c581590
                                  • Instruction ID: c100e5014b5992170476bbc43bebb2ba2da1431808fe81a71e266acd8ef40513
                                  • Opcode Fuzzy Hash: 828ff84207eb433cf9a696bb86e68d300887286fcb0314d35b55536c6c581590
                                  • Instruction Fuzzy Hash: 7AF0AF7160A3049FD310EF28C542E1AB7E4FF98710F40465AB898DB3D0E634EA00CB96
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                  • Instruction ID: 5ccef521c324d6f659a5746fc8031118ef42b281d701039c8dd50cf925450252
                                  • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                  • Instruction Fuzzy Hash: DBF05E727116129BFB219B4ECC80F16B7ACBFD5A60F190565AA089B360C764EC0187D2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                  • Instruction ID: ab80423fc763ffb55627dcb7dc4db71856d3a57c235e833936064d45ac9d9cc3
                                  • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                  • Instruction Fuzzy Hash: 95F0B472614204AFE714DB25CC01F96B7EAEF98744F148078AA45D7261FAB0DE01C654
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8c16d21d7d396306a13a298d1fc28bea5a0b0671fee5d09d2144dce9cfa8de44
                                  • Instruction ID: 92aee9157f75d1dc728f0984e78a5d2f009dbea3566c51b4b218d97866c2fb7c
                                  • Opcode Fuzzy Hash: 8c16d21d7d396306a13a298d1fc28bea5a0b0671fee5d09d2144dce9cfa8de44
                                  • Instruction Fuzzy Hash: DEF06275A02249EFCB04EF69C555E9EB7B4FF58300F008065B959EB385DA38EB01CB51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e99b57c76f6c6547ba771185cc1350a457962d29d69761f68ee3b3b93fa02a7f
                                  • Instruction ID: b30eccf83768accab66cc95b60e40b83a35c32af9e1d93f066aef79ae598c1ba
                                  • Opcode Fuzzy Hash: e99b57c76f6c6547ba771185cc1350a457962d29d69761f68ee3b3b93fa02a7f
                                  • Instruction Fuzzy Hash: E2F09A319166E59EEB228B6CC468B23BBD4DB08F24F08896ED589C7502C734DAC0C651
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7da731e33d518c4927d786d0a6cab6a8f3be9fb8f40e8973273b7cbb8b08bca4
                                  • Instruction ID: 1917fa534a2272f5bdcad824152a98ce21000f4bfd8249ff2368dc6f581e26f7
                                  • Opcode Fuzzy Hash: 7da731e33d518c4927d786d0a6cab6a8f3be9fb8f40e8973273b7cbb8b08bca4
                                  • Instruction Fuzzy Hash: E6F0273641968046DB327B2C6AD03D17F59BB82120F0D1045E4A967209C5749487C320
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d34d89b5662bfd857db21de2c385e7997ecabfb03a8b187c15a702daed6f5038
                                  • Instruction ID: 2477f7e713c5e81fd81f8a6c9aac5b3ed9154c6d41b8a6941576edf890e4c126
                                  • Opcode Fuzzy Hash: d34d89b5662bfd857db21de2c385e7997ecabfb03a8b187c15a702daed6f5038
                                  • Instruction Fuzzy Hash: 09F0527141D6499FE722875CC108F117BD49B04BA4F08942EC706C3202C328FB80CA50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                  • Instruction ID: c98f37031b56e94d3ab0235fbc44edc727d2223e00631b549b396e803f8f128e
                                  • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                  • Instruction Fuzzy Hash: 34E0D8323006012FE712AF598CC8F47776EDFD2B14F04007AB5089F292C9E2DD0982A4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                  • Instruction ID: c3b91daefad17a759c4e76b0739a44211f9bacb6436149168854ec074f3589c8
                                  • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                  • Instruction Fuzzy Hash: 03F030721042049FE361DF1AD944F52BBF8EB05765F85C426EA09AB561D379EC40CBA4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                  • Instruction ID: 28e052eaaba2aa91f491d5f49c66ec4ba138586065555ecbe38c9d5f223504db
                                  • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                  • Instruction Fuzzy Hash: 3FF0E53D204349DBEB1ACF19C040AE57BA8FB41790F044058FC46CB301D732EA81CB51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                  • Instruction ID: c7826272daa71bfc2650e7954ad955592b49a16c3f9423c93180ef2300efb849
                                  • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                  • Instruction Fuzzy Hash: 8CE0D832244649ABD3212A5D8800B677BA5DBD07A0F15042FE300CB151DB74DE44C7D8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 239e6d8843b3bc158177c38c23fee3e346e23df2b75cc0f69bef12dde961b840
                                  • Instruction ID: 7816a50cc1522f969fc2dc75eae4efac599524b437093f3259e062fd01530b7f
                                  • Opcode Fuzzy Hash: 239e6d8843b3bc158177c38c23fee3e346e23df2b75cc0f69bef12dde961b840
                                  • Instruction Fuzzy Hash: CBF0A071A256914FEF73D72CE344B5277E8BB20672F0A0564D40887912C720EC42C650
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                  • Instruction ID: 642eddac4831a912cb3f70deb0c08639dc6fc82d6cca54366c95cd929b8fb47f
                                  • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                  • Instruction Fuzzy Hash: 26E0DF32A00214BFDB21A7998D01F9BBEBCDB90FA1F050055B604E71D0E530DE00D6A0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6a5ad91a7d0f1a4d9806dabaf8f22ecb250b1deeb68cfbfcde1a852261f70b4
                                  • Instruction ID: 109d8d94de0302c1b72062eef1bd3a1d779fca40d79c475d567f2e725cb0a463
                                  • Opcode Fuzzy Hash: c6a5ad91a7d0f1a4d9806dabaf8f22ecb250b1deeb68cfbfcde1a852261f70b4
                                  • Instruction Fuzzy Hash: 86E09B727403508BCF258A1FC140A53B7ECEFD5A61F198079EA1D4B612C232F843C6D1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 41bf6a26a73b65b24e1da6c77c5d135f2e52664910cdf68fada680eddc41d4b2
                                  • Instruction ID: bf713691b38ea4f89cf8b31c3d3d4448cf3cae693e51e95404940497b5fed8e2
                                  • Opcode Fuzzy Hash: 41bf6a26a73b65b24e1da6c77c5d135f2e52664910cdf68fada680eddc41d4b2
                                  • Instruction Fuzzy Hash: 2DE09272100A549BC322BB2EDD15F8A779AEBA0764F014529F115971A0CA34E950C795
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                  • Instruction ID: 36af0e46e2f29f57537df11f42dfc9c1ba2d6c358f2c45802d90928ff4e0e951
                                  • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                  • Instruction Fuzzy Hash: 80E09231010A12DFE7326F2AC80CB567BE5BFA0B12F188C2CA19A024B0C77599C0CA41
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                  • Instruction ID: e05295f99602601a24b82438b25ac9613764d7e97f5f5b5a4e9d2cde351aa47a
                                  • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                  • Instruction Fuzzy Hash: 89E0C2343003058FE715CF19C040B627BBABFD5A11F28C068A9488F205EB33E852CB40
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03b08a686541286a8a65bdcf6b16620cd7903176b8b0019d1546cf3c6524df49
                                  • Instruction ID: 6eaa08ae741287b76d5e39bc39f0d31c5dd776ba832a93753c9bafd256f6d6b9
                                  • Opcode Fuzzy Hash: 03b08a686541286a8a65bdcf6b16620cd7903176b8b0019d1546cf3c6524df49
                                  • Instruction Fuzzy Hash: 53D02B725850346ACB36F11DBC04F933B9A9B40720F014C65F308D2010D654DF8592C4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                  • Instruction ID: 60935436907705bae434d2ca6fa2e7319aed73a716a671d28018b5c0031235b3
                                  • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                  • Instruction Fuzzy Hash: 64E0C232000A26EFDB323F1ADC44F9177AAFF96B11F144829E18A861A4C774AD81CB45
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3134e29c261042bf224bcdc8d10f91e0ef4ba063062da875cf182c5ddaf0c3cc
                                  • Instruction ID: 92118b90300b2223ffaaf1ac4349fcca3368271dca2e6127dd7fcb13850cef5d
                                  • Opcode Fuzzy Hash: 3134e29c261042bf224bcdc8d10f91e0ef4ba063062da875cf182c5ddaf0c3cc
                                  • Instruction Fuzzy Hash: 31E08C33100560ABC211FB5EDD50F8A739AEBA4760F000129F151C72A0CA30EE40C795
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                  • Instruction ID: 120027dd96a38e167d2a7919c06d854f8e27d9171f01a277504ad6b8e3661d00
                                  • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                  • Instruction Fuzzy Hash: 70E08633111A188BC728DE18D511B7277A4EF46720F09463EA61387780C534E548C795
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                  • Instruction ID: cd5273efc34505f15091bc211ff81fc0c72230bfe8dddb07f619cc50226c057a
                                  • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                  • Instruction Fuzzy Hash: C0D05E36511A50AFC3329F1BEA00C13BBF9FBC4B11705062EA54583924C670A846CBA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                  • Instruction ID: 7640ab72a91530889c2112cb07baba1d45cb9039f33b251fcf33f41eff1ce013
                                  • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                  • Instruction Fuzzy Hash: 2ED0A932204A20ABD732AA1DFC00FC333E8BB88721F060459B008C7050C3A0AC81CA84
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                  • Instruction ID: 0d5577c6d4c78e6180b480b30b757c3f078eda7e5533138415c0e947bc4b8fe0
                                  • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                  • Instruction Fuzzy Hash: 9FE0EC759507849BDF16DF5DC640F5ABBB9FB94B40F150058A5089B660C634E900CB40
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                  • Instruction ID: 4b6b8e1f36d58fdb7f298d9436ed0a86b6662f9355a76b400a3b5e9591560e0f
                                  • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                  • Instruction Fuzzy Hash: 33D0223221207093CB2C575A6880FA37A05EB80B94F0A002D380AD3A00C0058D43C2E0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                  • Instruction ID: 0dbacb5a4abf116aca683100cebc7ce0490c8e689f937fc32f8becf7fabe551e
                                  • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                  • Instruction Fuzzy Hash: 5CD012771D064DBBCB119F66DC01F957BA9E764BA0F444020B904C75A0C63AE950D585
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ded8f15881903fb3417e400348bfdab46017e0b6011ea5b7dd30209ae92ff7a7
                                  • Instruction ID: c64134d6230132d8bcf98bce151722ad831d6ddd44b5b5cdf913125f16aed159
                                  • Opcode Fuzzy Hash: ded8f15881903fb3417e400348bfdab46017e0b6011ea5b7dd30209ae92ff7a7
                                  • Instruction Fuzzy Hash: 27D0A771909209CBDF16CF09C614D2E3774FB50B40B40006CF700D1421D325EE01C600
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                  • Instruction ID: 2d140dd5399c5d896c941296aa7b1576cb98efa39c216e5fcd6974461c57ba97
                                  • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                  • Instruction Fuzzy Hash: BBD0C935617E80CFD61BCF0DC5A4F1533A4BB84B44F8108A0F401CBB26D62CDA40CA00
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                  • Instruction ID: a413a131050cd27f6249fc130a73a3d8be60ef66004a6fcfca5bae9f109d0f7a
                                  • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                  • Instruction Fuzzy Hash: A5C01232290648AFC712AB9ACD01F027BA9EBA8B40F000021F6048B670C631E920EA85
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                  • Instruction ID: 2278e3aa744955759a50ced0842758d1f465aa015ad5febe7fd7cc69c7f18cee
                                  • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                  • Instruction Fuzzy Hash: 82D01236200248EFCB01DF45C890D9A776AFBD8710F108419FD19076118A75ED62DA50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                  • Instruction ID: 8c56cd637895a8a68c50f29d6c9dccc60e1037942e757f9738835b7586dac585
                                  • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                  • Instruction Fuzzy Hash: 65C088B8B00A028FCF02CB2EC280F0833E8FB00300F000880EC08CBB22E228E800CA02
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 07f1b0264c10b268979d6a24b3414f9bca8a9fca9a020167777c9a1b047c0093
                                  • Instruction ID: 6c7440b7effadc4cb4a06e317d34c083ec1792f6937f52c68aa1d5c1988d1086
                                  • Opcode Fuzzy Hash: 07f1b0264c10b268979d6a24b3414f9bca8a9fca9a020167777c9a1b047c0093
                                  • Instruction Fuzzy Hash: 8F900232645904139140715848885469049A7E1301B55C011E0564554CCB148A966361
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b7ae4b269e94dbb3a0b6c573ab9f53ca4ddb6bae4e439df3ac859ce30558bbf
                                  • Instruction ID: 79a32878b53c290e2c9466bb445a8e3d28431dcb92ba43a1ca9bba3ca5983630
                                  • Opcode Fuzzy Hash: 7b7ae4b269e94dbb3a0b6c573ab9f53ca4ddb6bae4e439df3ac859ce30558bbf
                                  • Instruction Fuzzy Hash: A990026264160443414071584808406B049A7E2301395C115A0694560CC7188995A369
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3599de644e0f699e8e99883c6ab835fdf1c4c8e16444a7ad63909674a8098e57
                                  • Instruction ID: 0e9be6a0e88e5dea5a52e56fc6aa401ba1ed780f80093ca697151dc0a8c08750
                                  • Opcode Fuzzy Hash: 3599de644e0f699e8e99883c6ab835fdf1c4c8e16444a7ad63909674a8098e57
                                  • Instruction Fuzzy Hash: D590023224150C03D10471584808686504997D1301F55C011A6164655ED76589D17231
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 30cb98adb5eae29939952a45a8e2364b213a627625f391b19ab9bdece9a80b6c
                                  • Instruction ID: f93587501688a93bfec1405448224b5d092526e2826b12a6c2b57a1a4955755d
                                  • Opcode Fuzzy Hash: 30cb98adb5eae29939952a45a8e2364b213a627625f391b19ab9bdece9a80b6c
                                  • Instruction Fuzzy Hash: BF90023264550C03D15071584418746504997D1301F55C011A0164654DC7558B9577A1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6822e406652517fda38697c6eb26baa8e583a2d45205d774692364e01e5df48
                                  • Instruction ID: 00af402ca56410ddc0934b74a8223095bfc10ccb7f69e101dfd376d97e5d661f
                                  • Opcode Fuzzy Hash: f6822e406652517fda38697c6eb26baa8e583a2d45205d774692364e01e5df48
                                  • Instruction Fuzzy Hash: B990023224554C43D14071584408A46505997D1305F55C011A01A4694DD7258E95B761
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92b449bcaaefb4886c9efabe9d0edf590878f4ebaa1306e930e5bafb4ac82588
                                  • Instruction ID: 0fcf565185b671a05bac935ba81c6ae2cd49a3dbae8b53bbb3e0e4fe353a2bbf
                                  • Opcode Fuzzy Hash: 92b449bcaaefb4886c9efabe9d0edf590878f4ebaa1306e930e5bafb4ac82588
                                  • Instruction Fuzzy Hash: 0C9002A2241644934500B2588408B0A954997E1201B55C016E1194560CC6258991A235
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d62e63ec85f304e60b46a58a502b0c217d1b2782afdc5ddc2884297664ba7b0d
                                  • Instruction ID: 59f988e3fa955b91a04b78987d7791cc075442e17c8c05ac88bd0ca0b1ca3477
                                  • Opcode Fuzzy Hash: d62e63ec85f304e60b46a58a502b0c217d1b2782afdc5ddc2884297664ba7b0d
                                  • Instruction Fuzzy Hash: E7900226261504030145B558060850B5489A7D7351395C015F1556590CC72189A56321
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 74b5eab7756f3cece258b578ab4f4e457056463e5708e114620d767b0ae69cb3
                                  • Instruction ID: 513693493d2f8e3d2798b08dceee31ef979eea4bdb8cbb549baaea3e40411c82
                                  • Opcode Fuzzy Hash: 74b5eab7756f3cece258b578ab4f4e457056463e5708e114620d767b0ae69cb3
                                  • Instruction Fuzzy Hash: 3390023228150803D14171584408606504DA7D1241F95C012A0564554EC7558B96BB61
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b2b32a0d10f8ead029ca12f9b27cd58817309a20f369161c24d29119c152977b
                                  • Instruction ID: adb79fba0a530019acfc7e1aeb48e9d1fba1eef32ebe448b0d309962e65a1cfc
                                  • Opcode Fuzzy Hash: b2b32a0d10f8ead029ca12f9b27cd58817309a20f369161c24d29119c152977b
                                  • Instruction Fuzzy Hash: 8290022224554843D1007558540CA06504997D1205F55D011A11A4595DC7358991B231
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 045c5d8826c5f9040f716162c1fb571d1a5ba28c687e4a11c9dcea6e0012f350
                                  • Instruction ID: df2b26c024aa26f9be2a65237bed774b5e010b4fca5be9e5fc15a78ec85e70ca
                                  • Opcode Fuzzy Hash: 045c5d8826c5f9040f716162c1fb571d1a5ba28c687e4a11c9dcea6e0012f350
                                  • Instruction Fuzzy Hash: 3490022264550803D1407158541C706505997D1201F55D011A0164554DC7598B9577A1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9ba76759eef91c1f57d7da10896bd2615e1316ab9bf905ea0135d1af8e8cb6b5
                                  • Instruction ID: 56d3883ffae66e6d4c1e7193a3f326292e8b57ec8247559198ce476e96da4b5c
                                  • Opcode Fuzzy Hash: 9ba76759eef91c1f57d7da10896bd2615e1316ab9bf905ea0135d1af8e8cb6b5
                                  • Instruction Fuzzy Hash: EF90023224150803D1007158550C707504997D1201F55D411A0564558DD75689917221
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 822460f94adceb7abb15ae5b15f2bef868a29276c42c2d74a4e240f2c972f8b0
                                  • Instruction ID: 8360812d21957abcc45e724cc557eb1e9f5660698680baffa1337e21610cf1c1
                                  • Opcode Fuzzy Hash: 822460f94adceb7abb15ae5b15f2bef868a29276c42c2d74a4e240f2c972f8b0
                                  • Instruction Fuzzy Hash: 2190023224150C43D10071584408B46504997E1301F55C016A0264654DC715C9917621
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52a6f86f38fb6bb485864f373d20fa403132479a0c680da1b31196dcae8cbd3d
                                  • Instruction ID: 2bc1f7b130871d393a13a8e2d62ee81909b1b7d01fd6d13416ca651a193dba70
                                  • Opcode Fuzzy Hash: 52a6f86f38fb6bb485864f373d20fa403132479a0c680da1b31196dcae8cbd3d
                                  • Instruction Fuzzy Hash: E590023224190803D1007158480C747504997D1302F55C011A52A4555EC765C9D17631
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27ded4965bd06907e48e0000571ecf9361c3dad048f6faae587c2535acc65335
                                  • Instruction ID: ed7580fc86e68b431a779411e1d35ec97f07c3f1ad271a0901337941e42e6b66
                                  • Opcode Fuzzy Hash: 27ded4965bd06907e48e0000571ecf9361c3dad048f6faae587c2535acc65335
                                  • Instruction Fuzzy Hash: 1F90026225150443D10471584408706508997E2201F55C012A2294554CC6298DA16225
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b6d27b56e04e5869d08ea3b8a1dc222d31a5e81cff43fe6ba172b8cb3571574d
                                  • Instruction ID: 91106e1f2b06c63952f87d4d3bb78eb23cc045129e3f6a4597fe21ebde01a884
                                  • Opcode Fuzzy Hash: b6d27b56e04e5869d08ea3b8a1dc222d31a5e81cff43fe6ba172b8cb3571574d
                                  • Instruction Fuzzy Hash: 3190026224190803D14075584808607504997D1302F55C011A21A4555ECB298D917235
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d720bfbcca9a322888767c3cf94ee0af77176ae0b586da45d523bed8edd3af0
                                  • Instruction ID: 980551e80780cbab584c158cd86a1e140a89bbe634e1221647782aec04df4a7a
                                  • Opcode Fuzzy Hash: 6d720bfbcca9a322888767c3cf94ee0af77176ae0b586da45d523bed8edd3af0
                                  • Instruction Fuzzy Hash: DF90022234150803D10271584418606504DD7D2345F95C012E1564555DC7258A93B232
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 668c87214b2e4b7118c88c3eb6870a003cbd2296b4ade9a256713b9dfb1f0f57
                                  • Instruction ID: 1cdd3c6260dadd05dfb42803256e60069b58a49cfc37e6a05c950e43af4dc63c
                                  • Opcode Fuzzy Hash: 668c87214b2e4b7118c88c3eb6870a003cbd2296b4ade9a256713b9dfb1f0f57
                                  • Instruction Fuzzy Hash: 5990022228150C03D14071588418707504AD7D1601F55C011A0164554DC7168AA577B1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34882da5133eec27a7550848e2e83f0cdec96e4293337e4e25458137b1512833
                                  • Instruction ID: f32a9f342383e8291381f8648d4b7f6b26f679a94fc78d9b06c4cff2fbe562a1
                                  • Opcode Fuzzy Hash: 34882da5133eec27a7550848e2e83f0cdec96e4293337e4e25458137b1512833
                                  • Instruction Fuzzy Hash: 9990022224194843D14072584808B0F914997E2202F95C019A4296554CCA1589956721
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7db659be82ba817aaea7849c895cc7ce27a397b16073a87677a4e757acf4c921
                                  • Instruction ID: 191dc1f47d28d3dcc81ede666b4eb64ccf7bf2e8f4c39d1a8b624127ffeac7e0
                                  • Opcode Fuzzy Hash: 7db659be82ba817aaea7849c895cc7ce27a397b16073a87677a4e757acf4c921
                                  • Instruction Fuzzy Hash: E090023264560803D10071584518706604997D1201F65C411A0564568DC7958A9176A2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ee600148a074df9d22bddc69d08248d7a8c153665b54513c8efc0d8978a315a
                                  • Instruction ID: 0557486b5e0b7bba4af53f59bb5d2bff8492ed1219577bcaa45b1db669a77641
                                  • Opcode Fuzzy Hash: 7ee600148a074df9d22bddc69d08248d7a8c153665b54513c8efc0d8978a315a
                                  • Instruction Fuzzy Hash: EA90022228555503D150715C44086169049B7E1201F55C021A0954594DC65589957321
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b1a812eff3d2e0219b72997cdf93a02609233a06556903e4230368d3483cc0e
                                  • Instruction ID: 7aee6e931f9515baebf23619789cf299d6dddf0899db604f98fa2eb03149c2f8
                                  • Opcode Fuzzy Hash: 2b1a812eff3d2e0219b72997cdf93a02609233a06556903e4230368d3483cc0e
                                  • Instruction Fuzzy Hash: 2E90023224250543954072585808A4E914997E2302B95D415A0155554CCA1489A16321
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1519dafd90cd670159828fe7fefc9856f991eb866062bf8b745b99973d93150e
                                  • Instruction ID: 98e09d7d6ab75ade0eb7c8b3820c71129b7433381e5c41eb0bd99b7d0315f7ae
                                  • Opcode Fuzzy Hash: 1519dafd90cd670159828fe7fefc9856f991eb866062bf8b745b99973d93150e
                                  • Instruction Fuzzy Hash: 4E90023624150803D51071585808646508A97D1301F55D411A0564558DC75489E1B221
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                  • Instruction ID: 8077c2a9e5f5da3a71513c03d7719a71fff4278f8cab259ea33adb136b86025d
                                  • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                  • Instruction Fuzzy Hash:
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ___swprintf_l
                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                  • API String ID: 48624451-2108815105
                                  • Opcode ID: 5d9ad62724b6b5c2b44ba0720caa95fd42cbade9b346415c390a0228b37a773d
                                  • Instruction ID: 654c2385bf1f2ecff98a6990c5bf552687ee7b2b1abda6fcc2f1baea1534691d
                                  • Opcode Fuzzy Hash: 5d9ad62724b6b5c2b44ba0720caa95fd42cbade9b346415c390a0228b37a773d
                                  • Instruction Fuzzy Hash: 0C51D6B6A00116BFCB12DFAC899497EFBB8BB482417148269F5ADD7681D334DF4087A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ___swprintf_l
                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                  • API String ID: 48624451-2108815105
                                  • Opcode ID: 15ab473cae58a2f3d5a15560b5fc7496b1a283ae552940744d035f2a5c4af544
                                  • Instruction ID: 9ca733792bb2e273d2542bbd942b24fffbff3cc165019a08b3dd6acc9fef43bf
                                  • Opcode Fuzzy Hash: 15ab473cae58a2f3d5a15560b5fc7496b1a283ae552940744d035f2a5c4af544
                                  • Instruction Fuzzy Hash: C351F671B10646AECB30DF5DC89097FBBFCEF44601B04886AF59ED7641E674EA408760
                                  Strings
                                  • Execute=1, xrefs: 01934713
                                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 019346FC
                                  • ExecuteOptions, xrefs: 019346A0
                                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01934742
                                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01934655
                                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 01934787
                                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01934725
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                  • API String ID: 0-484625025
                                  • Opcode ID: 9abaf4b0505589c16a72f0bacb710392c3c71c0ccb870bcdc6b16bba1f5f8921
                                  • Instruction ID: 6eeea27ed3564c3273b42a383a06642512a1683b0a2870a9665b7523108343a5
                                  • Opcode Fuzzy Hash: 9abaf4b0505589c16a72f0bacb710392c3c71c0ccb870bcdc6b16bba1f5f8921
                                  • Instruction Fuzzy Hash: 3751F83160021A6BFF21ABA9DC89FA977A8EF58304F1400ADD709E71D1E7749B45CF51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                  • Instruction ID: 3a0197745d39979ce9a54edef4dc0d4430e78221f30d289944e39f4ddbd9d8a9
                                  • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                  • Instruction Fuzzy Hash: 45021671508342AFD709CF5CC890E6BBBE9EFC8704F04892DBA994B264DB31E945CB42
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: __aulldvrm
                                  • String ID: +$-$0$0
                                  • API String ID: 1302938615-699404926
                                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                  • Instruction ID: 1345c4b90a1b34ee6a11e45f4056fdf92db6ad7e4892b985f083256fda3c9f82
                                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                  • Instruction Fuzzy Hash: 5281D438E052498EEF2BCE6CC8507FEBBB9AF45321F184559D85BA76D1C7308940CB51
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ___swprintf_l
                                  • String ID: %%%u$[$]:%u
                                  • API String ID: 48624451-2819853543
                                  • Opcode ID: c02a562206713a2197724f2fb571d14a026d21650ea23175c3a640d87eb28660
                                  • Instruction ID: f15044fcd3af185f1c4679fc47d4b433ec13072065e1eafb7ba684b860c05fe7
                                  • Opcode Fuzzy Hash: c02a562206713a2197724f2fb571d14a026d21650ea23175c3a640d87eb28660
                                  • Instruction Fuzzy Hash: 4421517AE10159ABDB11DF69D840AEEBBFCFF54654F080126EA49E3240E7309A018BA1
                                  Strings
                                  • RTL: Re-Waiting, xrefs: 0193031E
                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 019302E7
                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 019302BD
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                  • API String ID: 0-2474120054
                                  • Opcode ID: 12fa93d4f2407fcb9f407695b991854256e7b23e3e0707ad855b48b0992cba7a
                                  • Instruction ID: 38386b4c5afeacff1863f33e2e56a47f7a3ab9a2aa6eb523c8a0edb23b275fe2
                                  • Opcode Fuzzy Hash: 12fa93d4f2407fcb9f407695b991854256e7b23e3e0707ad855b48b0992cba7a
                                  • Instruction Fuzzy Hash: 52E190706087419FE725CF28C888B2ABBE4BF85314F140A5DF6A9CB2E1D774DA45CB42
                                  Strings
                                  • RTL: Re-Waiting, xrefs: 01937BAC
                                  • RTL: Resource at %p, xrefs: 01937B8E
                                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01937B7F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                  • API String ID: 0-871070163
                                  • Opcode ID: 7aa0034ba219bb932f28e06e216fc3798fdbd8272e2b7f7b698d5dffe88f3b5c
                                  • Instruction ID: f6c4efa31f7cffea0b837ba3055548019cc721372b314536c14b1c5825decb78
                                  • Opcode Fuzzy Hash: 7aa0034ba219bb932f28e06e216fc3798fdbd8272e2b7f7b698d5dffe88f3b5c
                                  • Instruction Fuzzy Hash: 9841E2357007029FD725CE29CC40B6AB7E5EF88711F000A1DEA5ADB680DB31EA05CB91
                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0193728C
                                  Strings
                                  • RTL: Re-Waiting, xrefs: 019372C1
                                  • RTL: Resource at %p, xrefs: 019372A3
                                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01937294
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                  • API String ID: 885266447-605551621
                                  • Opcode ID: c01ff7e493cc9066798f78a05e5078522e746d1eebe556d1d0db7c5cae4417a1
                                  • Instruction ID: fa06b9befe1e8169447d6e1393b3d56fd260b645367f8c58f5391709112a55c1
                                  • Opcode Fuzzy Hash: c01ff7e493cc9066798f78a05e5078522e746d1eebe556d1d0db7c5cae4417a1
                                  • Instruction Fuzzy Hash: FB410071700207ABD725CE69CC81F6AB7A5FBA4711F10061DFA59EB280DB20F942CBD1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: ___swprintf_l
                                  • String ID: %%%u$]:%u
                                  • API String ID: 48624451-3050659472
                                  • Opcode ID: c9f7d62993e2966fc97e040a95b23c24623f77e7b421ef6d2a85eca9b58638a2
                                  • Instruction ID: d60994cff00510f5d7e2b1889a0557e305665eadd8b50b4ca5330d0790c1c52b
                                  • Opcode Fuzzy Hash: c9f7d62993e2966fc97e040a95b23c24623f77e7b421ef6d2a85eca9b58638a2
                                  • Instruction Fuzzy Hash: 60316472A102199FDB21DF2DDC40BEEB7FCEF54A11F44455AE94DE7240EB30AA448BA0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID: __aulldvrm
                                  • String ID: +$-
                                  • API String ID: 1302938615-2137968064
                                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                  • Instruction ID: ff0049a9694fd9b541f0779ce8a73f4b6746852d742eeb3024d8b69dad8ff2eb
                                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                  • Instruction Fuzzy Hash: 3A918571E002169EDB2ADF9DC880ABEBBB9AF44731F14451AEA99E72D0D730AD408751
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.2102921676.0000000001890000.00000040.00001000.00020000.00000000.sdmp, Offset: 01890000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1890000_DOC_PDF.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $$@
                                  • API String ID: 0-1194432280
                                  • Opcode ID: e9658c0dfa34f4c33e5f8cd027281d8ee4583007257da61f51a38938be713bb9
                                  • Instruction ID: 491ad8c209b068ff401b991069c72960436fa3bf0207d763e2b81d86808d27a8
                                  • Opcode Fuzzy Hash: e9658c0dfa34f4c33e5f8cd027281d8ee4583007257da61f51a38938be713bb9
                                  • Instruction Fuzzy Hash: 4C810A72D002699BDB35CB54CC45BEABBB8AB48714F0041EAEA1DF7240D7709E84CFA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                                  • API String ID: 0-393284711
                                  • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                  • Instruction ID: 3d1404134dcbcdab0448f3417cb94de70150d903ec9d2eddbcd44246bb7e6d23
                                  • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                  • Instruction Fuzzy Hash: F4E14870518F488FC7A5EF68C8947ABB7E1FB58300F404A2F959BC7255EF30A9418B85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
                                  • API String ID: 0-2916316912
                                  • Opcode ID: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                  • Instruction ID: 97187fe63feef23dea09df2b40d72ab23866623ab266c8bc43f1494fbf7cab3c
                                  • Opcode Fuzzy Hash: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                  • Instruction Fuzzy Hash: 76B16A30518B488EDB55EF688899AEEB7F1FF98300F50492FD49AC7251EF709905CB86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
                                  • API String ID: 0-1539916866
                                  • Opcode ID: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                  • Instruction ID: 682e303a9e5dfc9dcd1b2c30d7b59c59dac6e2ad872d861fca7e1c04bae2581f
                                  • Opcode Fuzzy Hash: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                  • Instruction Fuzzy Hash: 6841D070A18B088FDB14DF88A8566BEBBE2FB88700F40025FD849D3241DBB09D45CBD6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
                                  • API String ID: 0-355182820
                                  • Opcode ID: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                  • Instruction ID: 750766ef940d80e01f6dd9f185fed59e9bb62e12cff5ab8868a034c017fc172a
                                  • Opcode Fuzzy Hash: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                  • Instruction Fuzzy Hash: 48C15E70618B098FC758EF28C8A56DAF7E5FF98304F404A1F959AC7210DF70AA15CB86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                                  • API String ID: 0-97273177
                                  • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                  • Instruction ID: b681fb1c004b79a2d08d59a9a34078bfe7495e99793b8f8a565ad7283a50f3c6
                                  • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                  • Instruction Fuzzy Hash: EF51D4315187488FD719DF18D8916AAB7E5FBC9700F501A2FE8CBC7251DBB49906CB82
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                  • API String ID: 0-639201278
                                  • Opcode ID: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                  • Instruction ID: 4199a76dbdd17cb6c2e968233dfb7a5e0a5a68a206a7af8662d2cbcd8610eeea
                                  • Opcode Fuzzy Hash: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                  • Instruction Fuzzy Hash: 47C18E70618A194FC758EF68D8A5AAAB7E1FB98300F55476F848EC7250DF30EE05CB85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                  • API String ID: 0-639201278
                                  • Opcode ID: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                  • Instruction ID: 925a0c7cce66b4f03cc83d406bc2c6b60b5b94fb70a686da09e32412d781deb0
                                  • Opcode Fuzzy Hash: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                  • Instruction Fuzzy Hash: ACC17E70618A194FC758EF68D8A5AAAB7E1FB98300F55466F848EC7250DF30EE05CB85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: UR$2$L: $Pass$User$name$word
                                  • API String ID: 0-2058692283
                                  • Opcode ID: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                  • Instruction ID: 8a75947236d550a9092e75babbdcaed859262069f81662e8977df2375a04c198
                                  • Opcode Fuzzy Hash: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                  • Instruction Fuzzy Hash: 6DA18070A18B488BDB19EF689454BEEB7E1FF88300F40466FD48AD7291EF709945C785
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: UR$2$L: $Pass$User$name$word
                                  • API String ID: 0-2058692283
                                  • Opcode ID: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                  • Instruction ID: ac11040ab4c39ce060f2b89a9b602b3ae173c7e9f836cab6b169802ebfceb8e3
                                  • Opcode Fuzzy Hash: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                  • Instruction Fuzzy Hash: 47917F70A18B488BDB19EFA8D454BEEBBE1FB98300F40462FD48AD7251EF709945C785
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $.$e$n$v
                                  • API String ID: 0-1849617553
                                  • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                  • Instruction ID: 6eaa851066c4d6e7e6723f8d63083ff82f80cdd728136bb99114688196ed2832
                                  • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                  • Instruction Fuzzy Hash: D3716431618B498FD758EFA8C4946AAB7F5FF98304F00062FD48AC7261EB71DD458B85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 2.dl$dll$l32.$ole3$shel
                                  • API String ID: 0-1970020201
                                  • Opcode ID: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                  • Instruction ID: 203a21f9b69e3c9fa1c2d6ed70a0455bc2a8bf8f0520f14954e255ba915a948d
                                  • Opcode Fuzzy Hash: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                  • Instruction Fuzzy Hash: 2E514DB0918B4C8BDB54EF68C455AEEB7F1FF58300F404A2ED49AE7214EF3095458B89
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 4$\$dll$ion.$vers
                                  • API String ID: 0-1610437797
                                  • Opcode ID: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                  • Instruction ID: dc65972d4d99aef8ebf3bc0b25802b4519dddcbba4af149255876dd5a773ff48
                                  • Opcode Fuzzy Hash: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                  • Instruction Fuzzy Hash: 9C414030618B488FDB75EF6898557EAB7E4FB99301F40462F988EC7250EF31D9458782
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 32.d$cli.$dll$sspi$user
                                  • API String ID: 0-327345718
                                  • Opcode ID: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                  • Instruction ID: 37b5ca9538ab9df86dec07494bc66c3482e6420d51af235f1966694c97866919
                                  • Opcode Fuzzy Hash: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                  • Instruction Fuzzy Hash: 07415E30A28E0D8FCB58EF68C4A47AD77E1FB58300F41456BA88ED7250DE71D9418B86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .dll$el32$h$kern
                                  • API String ID: 0-4264704552
                                  • Opcode ID: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                  • Instruction ID: 1e7e36f65d11d7cfc6169cc19ac367f4443a619b16bd50e796c4e1825ca2c686
                                  • Opcode Fuzzy Hash: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                  • Instruction Fuzzy Hash: 024183B0A18B488FD769DF2884A43AAB7E1FB98300F104A6F94DEC3265DF70C945CB41
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Snif$f fr$om:
                                  • API String ID: 0-3434893486
                                  • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                  • Instruction ID: 31cff088c53c0012ff3ca60ec940f6d9b45c17061e28053c4b92d7873ff30488
                                  • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                  • Instruction Fuzzy Hash: AE31D031508B885FC71AEB28C8986DAB7D1FB84300F50491FE4DBC7251EA71A949CA43
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Snif$f fr$om:
                                  • API String ID: 0-3434893486
                                  • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                  • Instruction ID: 51724642708f9ec44894c45a68af8d0c3ee36e9785e08ef9214f0002cd484d19
                                  • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                  • Instruction Fuzzy Hash: 6B31E071508B486FD719EB28C8946EAB7D5FB94300F404D1FE4DBC3251EE70A906CA43
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .dll$chro$hild$me_c
                                  • API String ID: 0-3136806129
                                  • Opcode ID: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                  • Instruction ID: 72643e838159eb021c11db012c3183f5227e7b628abb5100557e51dc920aa8cb
                                  • Opcode Fuzzy Hash: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                  • Instruction Fuzzy Hash: 67314F70518B584FC784EF6888A4BAAB7E1FFD8200F94496F948EC7254DF30D945C792
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .dll$chro$hild$me_c
                                  • API String ID: 0-3136806129
                                  • Opcode ID: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                  • Instruction ID: b50cfcdbf94a8cf0342e4da05e3990d93ce4cd66df4c815e8aea10f88b0d3352
                                  • Opcode Fuzzy Hash: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                  • Instruction Fuzzy Hash: F3316170118B484FC794EF6888A4BAAB7E1FFD8300F944A6F948AC7254DF30D945C752
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                  • API String ID: 0-319646191
                                  • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                  • Instruction ID: a8a8bc6e826550745f4982e841eba089bd9896367fa87ebee210637054422e21
                                  • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                  • Instruction Fuzzy Hash: 5231D131A14A0C8BCB44EFA8C8947EEBBE1FF58205F40062BD48ED7240EF748A45C799
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                  • API String ID: 0-319646191
                                  • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                  • Instruction ID: c631e968dc470d98950f33fd03fa84bf28265dbacd12b0fbee7ef778d8aef900
                                  • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                  • Instruction Fuzzy Hash: 9E21D530A14A0C8BCB05EFA8C8547EEBBF1FF58205F40462BD49AD7250EF748A05C799
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .$l$l$t
                                  • API String ID: 0-168566397
                                  • Opcode ID: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                  • Instruction ID: 5f953d6c1d7137cbb741b61cf06a2250631b2ad1ac08637115f1ca8e55d2efc7
                                  • Opcode Fuzzy Hash: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                  • Instruction Fuzzy Hash: B2217A74A24A0D9BDB08EFA8D4547EABBF0FB18304F504A2FD089E3600DB749955CB84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .$l$l$t
                                  • API String ID: 0-168566397
                                  • Opcode ID: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                  • Instruction ID: a30589761bb671ed53d694e746f07ce7cb3e854c25d0901d601fe8e39124df91
                                  • Opcode Fuzzy Hash: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                  • Instruction Fuzzy Hash: 9A218D74A24A0D9FDB48EFA8D4547AEBAF0FF58304F504A2FD089D3600DB749955CB84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.4519061521.000000000EF10000.00000040.00000001.00040000.00000000.sdmp, Offset: 0EF10000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ef10000_explorer.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: auth$logi$pass$user
                                  • API String ID: 0-2393853802
                                  • Opcode ID: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                  • Instruction ID: 7589d0f81bab563ce037cc685217d894f8f7d977304aa045edc38e4496c2307a
                                  • Opcode Fuzzy Hash: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                  • Instruction Fuzzy Hash: 7221C030A24B0D8BCB05DF9998A06EEB7E1EFC8344F00466BD44ADB244D7B0D914CBD2

                                  Execution Graph

                                  Execution Coverage:1.5%
                                  Dynamic/Decrypted Code Coverage:6.7%
                                  Signature Coverage:0%
                                  Total number of Nodes:623
                                  Total number of Limit Nodes:78
                                  execution_graph 121143 5102ad0 LdrInitializeThunk 121146 2e8f0ed 121149 2e8b990 121146->121149 121150 2e8b9b6 121149->121150 121157 2e79d30 121150->121157 121152 2e8b9c2 121153 2e8b9e6 121152->121153 121165 2e78f30 121152->121165 121203 2e8a670 121153->121203 121158 2e79d3d 121157->121158 121206 2e79c80 121157->121206 121160 2e79d44 121158->121160 121218 2e79c20 121158->121218 121160->121152 121166 2e78f57 121165->121166 121636 2e7b1b0 121166->121636 121168 2e78f69 121640 2e7af00 121168->121640 121170 2e78f86 121176 2e78f8d 121170->121176 121711 2e7ae30 LdrLoadDll 121170->121711 121173 2e78ffc 121656 2e7f400 121173->121656 121175 2e79006 121177 2e8bf50 2 API calls 121175->121177 121200 2e790f2 121175->121200 121176->121200 121644 2e7f370 121176->121644 121178 2e7902a 121177->121178 121179 2e8bf50 2 API calls 121178->121179 121180 2e7903b 121179->121180 121181 2e8bf50 2 API calls 121180->121181 121182 2e7904c 121181->121182 121668 2e7ca80 121182->121668 121184 2e79059 121185 2e84a40 8 API calls 121184->121185 121186 2e79066 121185->121186 121187 2e84a40 8 API calls 121186->121187 121188 2e79077 121187->121188 121189 2e790a5 121188->121189 121190 2e79084 121188->121190 121191 2e84a40 8 API calls 121189->121191 121678 2e7d610 121190->121678 121199 2e790c1 121191->121199 121194 2e790e9 121196 2e78d00 23 API calls 121194->121196 121196->121200 121197 2e79092 121694 2e78d00 121197->121694 121199->121194 121712 2e7d6b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 121199->121712 121200->121153 121204 2e8a68f 121203->121204 121205 2e8af20 LdrLoadDll 121203->121205 121205->121204 121237 2e88b80 121206->121237 121210 2e79c9c 121211 2e79ca6 121210->121211 121244 2e8b270 121210->121244 121211->121158 121213 2e79ce3 121213->121211 121255 2e79aa0 121213->121255 121215 2e79d03 121261 2e79620 LdrLoadDll 121215->121261 121217 2e79d15 121217->121158 121610 2e8b560 121218->121610 121221 2e8b560 LdrLoadDll 121222 2e79c4b 121221->121222 121223 2e8b560 LdrLoadDll 121222->121223 121224 2e79c61 121223->121224 121225 2e7f170 121224->121225 121226 2e7f189 121225->121226 121618 2e7b030 121226->121618 121228 2e7f19c 121622 2e8a1a0 121228->121622 121232 2e7f1c2 121235 2e7f1ed 121232->121235 121629 2e8a220 121232->121629 121234 2e8a450 2 API calls 121236 2e79d55 121234->121236 121235->121234 121236->121152 121238 2e88b8f 121237->121238 121262 2e84e40 121238->121262 121240 2e79c93 121241 2e88a30 121240->121241 121268 2e8a5c0 121241->121268 121245 2e8b289 121244->121245 121275 2e84a40 121245->121275 121247 2e8b2a1 121248 2e8b2aa 121247->121248 121314 2e8b0b0 121247->121314 121248->121213 121250 2e8b2be 121250->121248 121332 2e89ec0 121250->121332 121588 2e77ea0 121255->121588 121257 2e79ac1 121257->121215 121258 2e79aba 121258->121257 121601 2e78160 121258->121601 121261->121217 121263 2e84e5a 121262->121263 121264 2e84e4e 121262->121264 121263->121240 121264->121263 121267 2e852c0 LdrLoadDll 121264->121267 121266 2e84fac 121266->121240 121267->121266 121271 2e8af20 121268->121271 121270 2e88a45 121270->121210 121272 2e8af30 121271->121272 121274 2e8af52 121271->121274 121273 2e84e40 LdrLoadDll 121272->121273 121273->121274 121274->121270 121276 2e84d75 121275->121276 121277 2e84a54 121275->121277 121276->121247 121277->121276 121340 2e89c10 121277->121340 121280 2e84b80 121343 2e8a320 121280->121343 121281 2e84b63 121400 2e8a420 LdrLoadDll 121281->121400 121284 2e84b6d 121284->121247 121285 2e84ba7 121286 2e8bd80 2 API calls 121285->121286 121289 2e84bb3 121286->121289 121287 2e84d39 121288 2e8a450 2 API calls 121287->121288 121291 2e84d40 121288->121291 121289->121284 121289->121287 121290 2e84d4f 121289->121290 121294 2e84c42 121289->121294 121409 2e84780 LdrLoadDll NtReadFile NtClose 121290->121409 121291->121247 121293 2e84d62 121293->121247 121295 2e84ca9 121294->121295 121297 2e84c51 121294->121297 121295->121287 121296 2e84cbc 121295->121296 121402 2e8a2a0 121296->121402 121299 2e84c6a 121297->121299 121300 2e84c56 121297->121300 121301 2e84c6f 121299->121301 121302 2e84c87 121299->121302 121401 2e84640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 121300->121401 121346 2e846e0 121301->121346 121302->121291 121358 2e84400 121302->121358 121307 2e84c60 121307->121247 121308 2e84c7d 121308->121247 121310 2e84d1c 121406 2e8a450 121310->121406 121311 2e84c9f 121311->121247 121313 2e84d28 121313->121247 121315 2e8b0c1 121314->121315 121316 2e8b0d3 121315->121316 121427 2e8bd00 121315->121427 121316->121250 121318 2e8b0f4 121430 2e84060 121318->121430 121320 2e8b117 121321 2e8b140 121320->121321 121322 2e84060 3 API calls 121320->121322 121321->121250 121324 2e8b139 121322->121324 121324->121321 121462 2e85380 121324->121462 121325 2e8b1ca 121326 2e8b1da 121325->121326 121556 2e8aec0 LdrLoadDll 121325->121556 121472 2e8ad30 121326->121472 121329 2e8b208 121551 2e89e80 121329->121551 121331 2e8b232 121331->121250 121331->121331 121333 2e8af20 LdrLoadDll 121332->121333 121334 2e89edc 121333->121334 121582 5102c0a 121334->121582 121335 2e89ef7 121337 2e8bd80 121335->121337 121585 2e8a630 121337->121585 121339 2e8b319 121339->121213 121341 2e8af20 LdrLoadDll 121340->121341 121342 2e84b34 121341->121342 121342->121280 121342->121281 121342->121284 121344 2e8af20 LdrLoadDll 121343->121344 121345 2e8a33c NtCreateFile 121344->121345 121345->121285 121347 2e846fc 121346->121347 121348 2e8a2a0 LdrLoadDll 121347->121348 121349 2e8471d 121348->121349 121350 2e84738 121349->121350 121351 2e84724 121349->121351 121353 2e8a450 2 API calls 121350->121353 121352 2e8a450 2 API calls 121351->121352 121354 2e8472d 121352->121354 121355 2e84741 121353->121355 121354->121308 121410 2e8bf90 LdrLoadDll RtlAllocateHeap 121355->121410 121357 2e8474c 121357->121308 121359 2e8444b 121358->121359 121360 2e8447e 121358->121360 121362 2e8a2a0 LdrLoadDll 121359->121362 121361 2e845c9 121360->121361 121365 2e8449a 121360->121365 121363 2e8a2a0 LdrLoadDll 121361->121363 121364 2e84466 121362->121364 121370 2e845e4 121363->121370 121366 2e8a450 2 API calls 121364->121366 121368 2e8a2a0 LdrLoadDll 121365->121368 121367 2e8446f 121366->121367 121367->121311 121369 2e844b5 121368->121369 121372 2e844bc 121369->121372 121373 2e844d1 121369->121373 121423 2e8a2e0 LdrLoadDll 121370->121423 121377 2e8a450 2 API calls 121372->121377 121374 2e844ec 121373->121374 121375 2e844d6 121373->121375 121386 2e844f1 121374->121386 121411 2e8bf50 121374->121411 121378 2e8a450 2 API calls 121375->121378 121376 2e8461e 121379 2e8a450 2 API calls 121376->121379 121380 2e844c5 121377->121380 121381 2e844df 121378->121381 121382 2e84629 121379->121382 121380->121311 121381->121311 121382->121311 121385 2e84557 121387 2e8456e 121385->121387 121422 2e8a260 LdrLoadDll 121385->121422 121393 2e84503 121386->121393 121414 2e8a3d0 121386->121414 121389 2e8458a 121387->121389 121390 2e84575 121387->121390 121392 2e8a450 2 API calls 121389->121392 121391 2e8a450 2 API calls 121390->121391 121391->121393 121394 2e84593 121392->121394 121393->121311 121395 2e845bf 121394->121395 121417 2e8bb50 121394->121417 121395->121311 121397 2e845aa 121398 2e8bd80 2 API calls 121397->121398 121399 2e845b3 121398->121399 121399->121311 121400->121284 121401->121307 121403 2e8af20 LdrLoadDll 121402->121403 121404 2e84d04 121403->121404 121405 2e8a2e0 LdrLoadDll 121404->121405 121405->121310 121407 2e8a46c NtClose 121406->121407 121408 2e8af20 LdrLoadDll 121406->121408 121407->121313 121408->121407 121409->121293 121410->121357 121424 2e8a5f0 121411->121424 121413 2e8bf68 121413->121386 121415 2e8af20 LdrLoadDll 121414->121415 121416 2e8a3ec NtReadFile 121415->121416 121416->121385 121418 2e8bb5d 121417->121418 121419 2e8bb74 121417->121419 121418->121419 121420 2e8bf50 2 API calls 121418->121420 121419->121397 121421 2e8bb8b 121420->121421 121421->121397 121422->121387 121423->121376 121425 2e8af20 LdrLoadDll 121424->121425 121426 2e8a60c RtlAllocateHeap 121425->121426 121426->121413 121428 2e8bd2d 121427->121428 121557 2e8a500 121427->121557 121428->121318 121431 2e84071 121430->121431 121432 2e84079 121430->121432 121431->121320 121433 2e8434c 121432->121433 121560 2e8cef0 121432->121560 121433->121320 121435 2e840cd 121436 2e8cef0 2 API calls 121435->121436 121439 2e840d8 121436->121439 121437 2e84126 121440 2e8cef0 2 API calls 121437->121440 121439->121437 121568 2e8cf90 LdrLoadDll RtlAllocateHeap RtlFreeHeap 121439->121568 121569 2e8d020 121439->121569 121443 2e8413a 121440->121443 121442 2e84197 121444 2e8cef0 2 API calls 121442->121444 121443->121442 121445 2e8d020 3 API calls 121443->121445 121446 2e841ad 121444->121446 121445->121443 121447 2e841ea 121446->121447 121450 2e8d020 3 API calls 121446->121450 121448 2e8cef0 2 API calls 121447->121448 121449 2e841f5 121448->121449 121451 2e8d020 3 API calls 121449->121451 121457 2e8422f 121449->121457 121450->121446 121451->121449 121454 2e8cf50 2 API calls 121455 2e8432e 121454->121455 121456 2e8cf50 2 API calls 121455->121456 121458 2e84338 121456->121458 121565 2e8cf50 121457->121565 121459 2e8cf50 2 API calls 121458->121459 121460 2e84342 121459->121460 121461 2e8cf50 2 API calls 121460->121461 121461->121433 121463 2e85391 121462->121463 121464 2e84a40 8 API calls 121463->121464 121466 2e853a7 121464->121466 121465 2e853fa 121465->121325 121466->121465 121467 2e853e2 121466->121467 121468 2e853f5 121466->121468 121469 2e8bd80 2 API calls 121467->121469 121470 2e8bd80 2 API calls 121468->121470 121471 2e853e7 121469->121471 121470->121465 121471->121325 121473 2e8ad44 121472->121473 121474 2e8abf0 LdrLoadDll 121472->121474 121575 2e8abf0 121473->121575 121474->121473 121477 2e8abf0 LdrLoadDll 121478 2e8ad56 121477->121478 121479 2e8abf0 LdrLoadDll 121478->121479 121480 2e8ad5f 121479->121480 121481 2e8abf0 LdrLoadDll 121480->121481 121482 2e8ad68 121481->121482 121483 2e8abf0 LdrLoadDll 121482->121483 121484 2e8ad71 121483->121484 121485 2e8abf0 LdrLoadDll 121484->121485 121486 2e8ad7d 121485->121486 121487 2e8abf0 LdrLoadDll 121486->121487 121488 2e8ad86 121487->121488 121489 2e8abf0 LdrLoadDll 121488->121489 121490 2e8ad8f 121489->121490 121491 2e8abf0 LdrLoadDll 121490->121491 121492 2e8ad98 121491->121492 121493 2e8abf0 LdrLoadDll 121492->121493 121494 2e8ada1 121493->121494 121495 2e8abf0 LdrLoadDll 121494->121495 121496 2e8adaa 121495->121496 121497 2e8abf0 LdrLoadDll 121496->121497 121498 2e8adb6 121497->121498 121499 2e8abf0 LdrLoadDll 121498->121499 121500 2e8adbf 121499->121500 121501 2e8abf0 LdrLoadDll 121500->121501 121502 2e8adc8 121501->121502 121503 2e8abf0 LdrLoadDll 121502->121503 121504 2e8add1 121503->121504 121505 2e8abf0 LdrLoadDll 121504->121505 121506 2e8adda 121505->121506 121507 2e8abf0 LdrLoadDll 121506->121507 121508 2e8ade3 121507->121508 121509 2e8abf0 LdrLoadDll 121508->121509 121510 2e8adef 121509->121510 121511 2e8abf0 LdrLoadDll 121510->121511 121512 2e8adf8 121511->121512 121513 2e8abf0 LdrLoadDll 121512->121513 121514 2e8ae01 121513->121514 121515 2e8abf0 LdrLoadDll 121514->121515 121516 2e8ae0a 121515->121516 121517 2e8abf0 LdrLoadDll 121516->121517 121518 2e8ae13 121517->121518 121519 2e8abf0 LdrLoadDll 121518->121519 121520 2e8ae1c 121519->121520 121521 2e8abf0 LdrLoadDll 121520->121521 121522 2e8ae28 121521->121522 121523 2e8abf0 LdrLoadDll 121522->121523 121524 2e8ae31 121523->121524 121525 2e8abf0 LdrLoadDll 121524->121525 121526 2e8ae3a 121525->121526 121527 2e8abf0 LdrLoadDll 121526->121527 121528 2e8ae43 121527->121528 121529 2e8abf0 LdrLoadDll 121528->121529 121530 2e8ae4c 121529->121530 121531 2e8abf0 LdrLoadDll 121530->121531 121532 2e8ae55 121531->121532 121533 2e8abf0 LdrLoadDll 121532->121533 121534 2e8ae61 121533->121534 121535 2e8abf0 LdrLoadDll 121534->121535 121536 2e8ae6a 121535->121536 121537 2e8abf0 LdrLoadDll 121536->121537 121538 2e8ae73 121537->121538 121539 2e8abf0 LdrLoadDll 121538->121539 121540 2e8ae7c 121539->121540 121541 2e8abf0 LdrLoadDll 121540->121541 121542 2e8ae85 121541->121542 121543 2e8abf0 LdrLoadDll 121542->121543 121544 2e8ae8e 121543->121544 121545 2e8abf0 LdrLoadDll 121544->121545 121546 2e8ae9a 121545->121546 121547 2e8abf0 LdrLoadDll 121546->121547 121548 2e8aea3 121547->121548 121549 2e8abf0 LdrLoadDll 121548->121549 121550 2e8aeac 121549->121550 121550->121329 121552 2e8af20 LdrLoadDll 121551->121552 121553 2e89e9c 121552->121553 121581 5102df0 LdrInitializeThunk 121553->121581 121554 2e89eb3 121554->121331 121556->121326 121558 2e8af20 LdrLoadDll 121557->121558 121559 2e8a51c NtAllocateVirtualMemory 121558->121559 121559->121428 121561 2e8cf00 121560->121561 121562 2e8cf06 121560->121562 121561->121435 121563 2e8bf50 2 API calls 121562->121563 121564 2e8cf2c 121563->121564 121564->121435 121566 2e8bd80 2 API calls 121565->121566 121567 2e84324 121566->121567 121567->121454 121568->121439 121570 2e8cf90 121569->121570 121571 2e8cfed 121570->121571 121572 2e8bf50 2 API calls 121570->121572 121571->121439 121573 2e8cfca 121572->121573 121574 2e8bd80 2 API calls 121573->121574 121574->121571 121576 2e8ac0b 121575->121576 121577 2e84e40 LdrLoadDll 121576->121577 121578 2e8ac2b 121577->121578 121579 2e84e40 LdrLoadDll 121578->121579 121580 2e8acd7 121578->121580 121579->121580 121580->121477 121581->121554 121583 5102c11 121582->121583 121584 5102c1f LdrInitializeThunk 121582->121584 121583->121335 121584->121335 121586 2e8a64c RtlFreeHeap 121585->121586 121587 2e8af20 LdrLoadDll 121585->121587 121586->121339 121587->121586 121589 2e77eb0 121588->121589 121590 2e77eab 121588->121590 121591 2e8bd00 2 API calls 121589->121591 121590->121258 121597 2e77ed5 121591->121597 121592 2e77f38 121592->121258 121593 2e89e80 2 API calls 121593->121597 121594 2e77f3e 121596 2e77f64 121594->121596 121598 2e8a580 2 API calls 121594->121598 121596->121258 121597->121592 121597->121593 121597->121594 121599 2e8bd00 2 API calls 121597->121599 121604 2e8a580 121597->121604 121600 2e77f55 121598->121600 121599->121597 121600->121258 121602 2e8a580 2 API calls 121601->121602 121603 2e7817e 121602->121603 121603->121215 121605 2e8af20 LdrLoadDll 121604->121605 121606 2e8a59c 121605->121606 121609 5102c70 LdrInitializeThunk 121606->121609 121607 2e8a5b3 121607->121597 121609->121607 121611 2e8b583 121610->121611 121614 2e7ace0 121611->121614 121615 2e7ad04 121614->121615 121616 2e79c3a 121615->121616 121617 2e7ad40 LdrLoadDll 121615->121617 121616->121221 121617->121616 121619 2e7b053 121618->121619 121621 2e7b0d0 121619->121621 121634 2e89c50 LdrLoadDll 121619->121634 121621->121228 121623 2e8af20 LdrLoadDll 121622->121623 121624 2e7f1ab 121623->121624 121624->121236 121625 2e8a790 121624->121625 121626 2e8a796 121625->121626 121627 2e8a7af LookupPrivilegeValueW 121626->121627 121628 2e8af20 LdrLoadDll 121626->121628 121627->121232 121628->121627 121630 2e8af20 LdrLoadDll 121629->121630 121631 2e8a23c 121630->121631 121635 5102ea0 LdrInitializeThunk 121631->121635 121632 2e8a25b 121632->121235 121634->121621 121635->121632 121637 2e7b1e0 121636->121637 121638 2e7b030 LdrLoadDll 121637->121638 121639 2e7b1f4 121638->121639 121639->121168 121641 2e7af24 121640->121641 121713 2e89c50 LdrLoadDll 121641->121713 121643 2e7af5e 121643->121170 121645 2e7f39c 121644->121645 121646 2e7b1b0 LdrLoadDll 121645->121646 121647 2e7f3ae 121646->121647 121714 2e7f280 121647->121714 121650 2e7f3e1 121654 2e8a450 2 API calls 121650->121654 121655 2e7f3f2 121650->121655 121651 2e7f3c9 121652 2e8a450 2 API calls 121651->121652 121653 2e7f3d4 121651->121653 121652->121653 121653->121173 121654->121655 121655->121173 121657 2e7f42c 121656->121657 121734 2e7b2a0 121657->121734 121659 2e7f43e 121660 2e7f280 3 API calls 121659->121660 121661 2e7f44f 121660->121661 121662 2e7f471 121661->121662 121663 2e7f459 121661->121663 121665 2e7f482 121662->121665 121667 2e8a450 2 API calls 121662->121667 121664 2e7f464 121663->121664 121666 2e8a450 2 API calls 121663->121666 121664->121175 121665->121175 121666->121664 121667->121665 121669 2e7ca96 121668->121669 121670 2e7caa0 121668->121670 121669->121184 121671 2e7af00 LdrLoadDll 121670->121671 121672 2e7cb3e 121671->121672 121673 2e7cb64 121672->121673 121674 2e7b030 LdrLoadDll 121672->121674 121673->121184 121675 2e7cb80 121674->121675 121676 2e84a40 8 API calls 121675->121676 121677 2e7cbd5 121676->121677 121677->121184 121679 2e7d636 121678->121679 121680 2e7b030 LdrLoadDll 121679->121680 121681 2e7d64a 121680->121681 121738 2e7d300 121681->121738 121683 2e7908b 121684 2e7cbf0 121683->121684 121685 2e7cc16 121684->121685 121686 2e7b030 LdrLoadDll 121685->121686 121687 2e7cc99 121685->121687 121686->121687 121688 2e7b030 LdrLoadDll 121687->121688 121689 2e7cd06 121688->121689 121690 2e7af00 LdrLoadDll 121689->121690 121691 2e7cd6f 121690->121691 121692 2e7b030 LdrLoadDll 121691->121692 121693 2e7ce1f 121692->121693 121693->121197 121696 2e78d14 121694->121696 121767 2e7f6c0 121694->121767 121707 2e78f25 121696->121707 121772 2e84390 121696->121772 121698 2e78d70 121698->121707 121775 2e78ab0 121698->121775 121701 2e8cef0 2 API calls 121702 2e78db2 121701->121702 121703 2e8d020 3 API calls 121702->121703 121708 2e78dc7 121703->121708 121704 2e77ea0 4 API calls 121704->121708 121707->121153 121708->121704 121708->121707 121709 2e7c7a0 18 API calls 121708->121709 121710 2e78160 2 API calls 121708->121710 121780 2e7f660 121708->121780 121784 2e7f070 21 API calls 121708->121784 121709->121708 121710->121708 121711->121176 121712->121194 121713->121643 121715 2e7f29a 121714->121715 121723 2e7f350 121714->121723 121716 2e7b030 LdrLoadDll 121715->121716 121717 2e7f2bc 121716->121717 121724 2e89f00 121717->121724 121719 2e7f2fe 121727 2e89f40 121719->121727 121722 2e8a450 2 API calls 121722->121723 121723->121650 121723->121651 121725 2e89f1c 121724->121725 121726 2e8af20 LdrLoadDll 121724->121726 121725->121719 121726->121725 121728 2e89f56 121727->121728 121729 2e8af20 LdrLoadDll 121728->121729 121730 2e89f5c 121729->121730 121733 51035c0 LdrInitializeThunk 121730->121733 121731 2e7f344 121731->121722 121733->121731 121735 2e7b2c7 121734->121735 121736 2e7b030 LdrLoadDll 121735->121736 121737 2e7b303 121736->121737 121737->121659 121739 2e7d317 121738->121739 121747 2e7f700 121739->121747 121743 2e7d38b 121744 2e7d392 121743->121744 121758 2e8a260 LdrLoadDll 121743->121758 121744->121683 121746 2e7d3a5 121746->121683 121748 2e7f725 121747->121748 121759 2e781a0 121748->121759 121750 2e7d35f 121755 2e8a6a0 121750->121755 121751 2e84a40 8 API calls 121753 2e7f749 121751->121753 121753->121750 121753->121751 121754 2e8bd80 2 API calls 121753->121754 121766 2e7f540 LdrLoadDll CreateProcessInternalW LdrInitializeThunk 121753->121766 121754->121753 121756 2e8af20 LdrLoadDll 121755->121756 121757 2e8a6bf CreateProcessInternalW 121756->121757 121757->121743 121758->121746 121760 2e7829f 121759->121760 121761 2e781b5 121759->121761 121760->121753 121761->121760 121762 2e84a40 8 API calls 121761->121762 121763 2e78222 121762->121763 121764 2e8bd80 2 API calls 121763->121764 121765 2e78249 121763->121765 121764->121765 121765->121753 121766->121753 121768 2e7f6df 121767->121768 121769 2e84e40 LdrLoadDll 121767->121769 121770 2e7f6e6 SetErrorMode 121768->121770 121771 2e7f6ed 121768->121771 121769->121768 121770->121771 121771->121696 121785 2e7f490 121772->121785 121774 2e843b6 121774->121698 121776 2e8bd00 2 API calls 121775->121776 121779 2e78ad5 121776->121779 121777 2e78cea 121777->121701 121779->121777 121804 2e89840 121779->121804 121781 2e7f673 121780->121781 121852 2e89e50 121781->121852 121784->121708 121786 2e7f4ad 121785->121786 121792 2e89f80 121786->121792 121789 2e7f4f5 121789->121774 121793 2e8af20 LdrLoadDll 121792->121793 121794 2e89f9c 121793->121794 121802 5102f30 LdrInitializeThunk 121794->121802 121795 2e7f4ee 121795->121789 121797 2e89fd0 121795->121797 121798 2e89fec 121797->121798 121799 2e8af20 LdrLoadDll 121797->121799 121803 5102d10 LdrInitializeThunk 121798->121803 121799->121798 121800 2e7f51e 121800->121774 121802->121795 121803->121800 121805 2e8bf50 2 API calls 121804->121805 121806 2e89857 121805->121806 121825 2e79310 121806->121825 121808 2e89872 121809 2e89899 121808->121809 121810 2e898b0 121808->121810 121811 2e8bd80 2 API calls 121809->121811 121813 2e8bd00 2 API calls 121810->121813 121812 2e898a6 121811->121812 121812->121777 121814 2e898ea 121813->121814 121815 2e8bd00 2 API calls 121814->121815 121816 2e89903 121815->121816 121822 2e89ba4 121816->121822 121831 2e8bd40 LdrLoadDll 121816->121831 121818 2e89b89 121819 2e89b90 121818->121819 121818->121822 121820 2e8bd80 2 API calls 121819->121820 121821 2e89b9a 121820->121821 121821->121777 121823 2e8bd80 2 API calls 121822->121823 121824 2e89bf9 121823->121824 121824->121777 121826 2e79335 121825->121826 121827 2e7ace0 LdrLoadDll 121826->121827 121828 2e79368 121827->121828 121830 2e7938d 121828->121830 121832 2e7cf10 121828->121832 121830->121808 121831->121818 121833 2e7cf3c 121832->121833 121834 2e8a1a0 LdrLoadDll 121833->121834 121835 2e7cf55 121834->121835 121836 2e7cf5c 121835->121836 121843 2e8a1e0 121835->121843 121836->121830 121840 2e7cf97 121841 2e8a450 2 API calls 121840->121841 121842 2e7cfba 121841->121842 121842->121830 121844 2e8af20 LdrLoadDll 121843->121844 121845 2e8a1fc 121844->121845 121851 5102ca0 LdrInitializeThunk 121845->121851 121846 2e7cf7f 121846->121836 121848 2e8a7d0 121846->121848 121849 2e8a7ef 121848->121849 121850 2e8af20 LdrLoadDll 121848->121850 121849->121840 121850->121849 121851->121846 121853 2e89e6c 121852->121853 121854 2e8af20 LdrLoadDll 121852->121854 121857 5102dd0 LdrInitializeThunk 121853->121857 121854->121853 121855 2e7f69e 121855->121708 121857->121855 121858 2e89040 121859 2e8bd00 2 API calls 121858->121859 121860 2e8907b 121859->121860 121861 2e8915c 121860->121861 121862 2e7ace0 LdrLoadDll 121860->121862 121863 2e890b1 121862->121863 121864 2e84e40 LdrLoadDll 121863->121864 121866 2e890cd 121864->121866 121865 2e890e0 Sleep 121865->121866 121866->121861 121866->121865 121869 2e88c60 LdrLoadDll 121866->121869 121870 2e88e70 LdrLoadDll 121866->121870 121869->121866 121870->121866 121871 4ddcb84 121874 4dda042 121871->121874 121873 4ddcba5 121875 4dda06b 121874->121875 121876 4dda182 NtQueryInformationProcess 121875->121876 121891 4dda56c 121875->121891 121878 4dda1ba 121876->121878 121877 4dda1ef 121877->121873 121878->121877 121879 4dda2db 121878->121879 121880 4dda290 121878->121880 121881 4dda2fc NtSuspendThread 121879->121881 121903 4dd9de2 NtCreateSection NtMapViewOfSection NtClose 121880->121903 121883 4dda30d 121881->121883 121885 4dda331 121881->121885 121883->121873 121884 4dda2cf 121884->121873 121888 4dda412 121885->121888 121894 4dd9bb2 121885->121894 121887 4dda531 121890 4dda552 NtResumeThread 121887->121890 121888->121887 121889 4dda4a6 NtSetContextThread 121888->121889 121893 4dda4bd 121889->121893 121890->121891 121891->121873 121892 4dda51c NtQueueApcThread 121892->121887 121893->121887 121893->121892 121895 4dd9bf7 121894->121895 121896 4dd9c66 NtCreateSection 121895->121896 121897 4dd9d4e 121896->121897 121898 4dd9ca0 121896->121898 121897->121888 121899 4dd9cc1 NtMapViewOfSection 121898->121899 121899->121897 121900 4dd9d0c 121899->121900 121900->121897 121901 4dd9d88 121900->121901 121902 4dd9dc5 NtClose 121901->121902 121902->121888 121903->121884

                                  Control-flow Graph

                                  APIs
                                  • NtQueryInformationProcess.NTDLL ref: 04DDA19F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503683099.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4dd0000_msdt.jbxd
                                  Similarity
                                  • API ID: InformationProcessQuery
                                  • String ID: 0
                                  • API String ID: 1778838933-4108050209
                                  • Opcode ID: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
                                  • Instruction ID: cbb3b9349a4cd4ffe8c036d72b09b823a43031b208e89616f930066925b600b7
                                  • Opcode Fuzzy Hash: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
                                  • Instruction Fuzzy Hash: 7BF11070618A8C8FDFA5EF68C894AEEB7E1FF98304F40462AD44AD7254DF34A541CB41

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 207 4dd9baf-4dd9bef 208 4dd9bf7-4dd9bfe 207->208 209 4dd9bf2 call 4dd9102 207->209 210 4dd9c0c-4dd9c9a call 4ddb942 * 2 NtCreateSection 208->210 211 4dd9c00 208->211 209->208 217 4dd9d5a-4dd9d68 210->217 218 4dd9ca0-4dd9d0a call 4ddb942 NtMapViewOfSection 210->218 212 4dd9c02-4dd9c0a 211->212 212->210 212->212 221 4dd9d0c-4dd9d4c 218->221 222 4dd9d52 218->222 224 4dd9d4e-4dd9d4f 221->224 225 4dd9d69-4dd9d6b 221->225 222->217 224->222 226 4dd9d6d-4dd9d72 225->226 227 4dd9d88-4dd9ddc call 4ddcd62 NtClose 225->227 228 4dd9d74-4dd9d86 call 4dd9172 226->228 228->227
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503683099.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4dd0000_msdt.jbxd
                                  Similarity
                                  • API ID: Section$CloseCreateView
                                  • String ID: @$@
                                  • API String ID: 1133238012-149943524
                                  • Opcode ID: db7dcd85dc853400a789dde9de35cb8114d6383d98fd4a16120e7ccab82aa783
                                  • Instruction ID: fd19424cee1774d075e2a28f723f067723262ff8e87bdefb9664e446ae75a3d4
                                  • Opcode Fuzzy Hash: db7dcd85dc853400a789dde9de35cb8114d6383d98fd4a16120e7ccab82aa783
                                  • Instruction Fuzzy Hash: 47619370218B488FCB58EF58D8956AABBE0FF98314F50062EE58AC3251DF35E441CB86

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 266 4dd9bb2-4dd9bfe call 4dd9102 269 4dd9c0c-4dd9c9a call 4ddb942 * 2 NtCreateSection 266->269 270 4dd9c00 266->270 276 4dd9d5a-4dd9d68 269->276 277 4dd9ca0-4dd9d0a call 4ddb942 NtMapViewOfSection 269->277 271 4dd9c02-4dd9c0a 270->271 271->269 271->271 280 4dd9d0c-4dd9d4c 277->280 281 4dd9d52 277->281 283 4dd9d4e-4dd9d4f 280->283 284 4dd9d69-4dd9d6b 280->284 281->276 283->281 285 4dd9d6d-4dd9d72 284->285 286 4dd9d88-4dd9ddc call 4ddcd62 NtClose 284->286 287 4dd9d74-4dd9d86 call 4dd9172 285->287 287->286
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503683099.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4dd0000_msdt.jbxd
                                  Similarity
                                  • API ID: Section$CreateView
                                  • String ID: @$@
                                  • API String ID: 1585966358-149943524
                                  • Opcode ID: d19581801156352ea8c1368f03ac477e7143ca4b49b2be0ea58d8e64d299f740
                                  • Instruction ID: 8a32749c4a49e6fce786b0337288ede9cf9e30dc18891c1eb373bab435c71175
                                  • Opcode Fuzzy Hash: d19581801156352ea8c1368f03ac477e7143ca4b49b2be0ea58d8e64d299f740
                                  • Instruction Fuzzy Hash: E45170B0618B088FD758DF58D8956AABBE0FF88314F50062EE58EC3691DF35E441CB86

                                  Control-flow Graph

                                  APIs
                                  • NtQueryInformationProcess.NTDLL ref: 04DDA19F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503683099.0000000004DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DD0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_4dd0000_msdt.jbxd
                                  Similarity
                                  • API ID: InformationProcessQuery
                                  • String ID: 0
                                  • API String ID: 1778838933-4108050209
                                  • Opcode ID: 4a13b2017a61ababd9bba988d9a9b5b8b8f576b3da72e298de5122239bed11ad
                                  • Instruction ID: 569d24bcb993bc65407a63325f0971c972e0bd811c956bd426233e6b63f2f110
                                  • Opcode Fuzzy Hash: 4a13b2017a61ababd9bba988d9a9b5b8b8f576b3da72e298de5122239bed11ad
                                  • Instruction Fuzzy Hash: 3F512D70918A8C8FDBA9EF68C8946EEBBF4FB98305F40462ED44AD7250DF349645CB41

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 543 2e8a320-2e8a371 call 2e8af20 NtCreateFile
                                  APIs
                                  • NtCreateFile.NTDLL(00000060,00000000,.z`,02E84BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,02E84BA7,007A002E,00000000,00000060,00000000,00000000), ref: 02E8A36D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID: .z`
                                  • API String ID: 823142352-1441809116
                                  • Opcode ID: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                  • Instruction ID: 2fff5ad755174e0346b35fe304eca14c36517b7ca9dd65a65f97d0a3233105b6
                                  • Opcode Fuzzy Hash: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                  • Instruction Fuzzy Hash: F3F0B2B2200208AFCB08DF89DC84EEB77ADAF8C754F158248BA1D97240C630E8118BA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 585 2e8a44a-2e8a44c 586 2e8a40a-2e8a419 NtReadFile 585->586 587 2e8a44e-2e8a479 call 2e8af20 NtClose 585->587
                                  APIs
                                  • NtReadFile.NTDLL(02E84D62,5EB65239,FFFFFFFF,02E84A21,?,?,02E84D62,?,02E84A21,FFFFFFFF,5EB65239,02E84D62,?,00000000), ref: 02E8A415
                                  • NtClose.NTDLL(02E84D40,?,?,02E84D40,00000000,FFFFFFFF), ref: 02E8A475
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseFileRead
                                  • String ID:
                                  • API String ID: 752142053-0
                                  • Opcode ID: 88c7c14c84b12091fafcc31e9dd03e17324da31053e97c1e0845d938bc8c69a2
                                  • Instruction ID: 3cee0abeb09228ec70b716eb5041e67dc36850afb6e0fcfa2a5a86be3a7411e5
                                  • Opcode Fuzzy Hash: 88c7c14c84b12091fafcc31e9dd03e17324da31053e97c1e0845d938bc8c69a2
                                  • Instruction Fuzzy Hash: 29E02B772452046FD714EB94BC84DE7BB59EF84324F1481AAFE9C5B241C531E90087E0
                                  APIs
                                  • NtReadFile.NTDLL(02E84D62,5EB65239,FFFFFFFF,02E84A21,?,?,02E84D62,?,02E84A21,FFFFFFFF,5EB65239,02E84D62,?,00000000), ref: 02E8A415
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                  • Instruction ID: dbda2c0a636e5a8665353009b39c0107c9c93b2f7e7d79c13ce15591799a3f4a
                                  • Opcode Fuzzy Hash: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                  • Instruction Fuzzy Hash: 1FF0A4B2200208AFCB14DF89DC80EEB77ADAF8C754F158259BA1D97241D630E8118BA0
                                  APIs
                                  • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,02E72D11,00002000,00003000,00000004), ref: 02E8A539
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateMemoryVirtual
                                  • String ID:
                                  • API String ID: 2167126740-0
                                  • Opcode ID: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                  • Instruction ID: 56c5c803af496f25ccefd481c2c3975127958d8f2f3e958edefd97aded237315
                                  • Opcode Fuzzy Hash: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                  • Instruction Fuzzy Hash: 1CF015B2200208AFCB14DF89DC80EAB77ADAF88754F118159BE1C97241C630F810CBA0
                                  APIs
                                  • NtClose.NTDLL(02E84D40,?,?,02E84D40,00000000,FFFFFFFF), ref: 02E8A475
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                  • Instruction ID: 447209585909dd6d6c9af6761f1e5dd3039a7244fc14b0f1cabd1f2f187e9711
                                  • Opcode Fuzzy Hash: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                  • Instruction Fuzzy Hash: 69D012762402146BD710EB99DC45E97775DEF44750F154455BA5C5B241C530F90086E0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 4057c786e070e751b5d2a319ca26090ff72cf03782f865647c13b17732d7b816
                                  • Instruction ID: d91d1b0d5bcddbbae4511b406fa07e7a03b161b4f7189c0894d10dd43466c228
                                  • Opcode Fuzzy Hash: 4057c786e070e751b5d2a319ca26090ff72cf03782f865647c13b17732d7b816
                                  • Instruction Fuzzy Hash: 7690023264550413D10071585654706201587D1201FA5C461A4425568D87998A5166A6
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: fb31284d48f185d3a6850a11ca2cc4d6dbb42542fb8c445aa141f431af397550
                                  • Instruction ID: 81015d7db6151d0a5f9adf4223d030a6b6fdba0842f574386b0df84d7a150606
                                  • Opcode Fuzzy Hash: fb31284d48f185d3a6850a11ca2cc4d6dbb42542fb8c445aa141f431af397550
                                  • Instruction Fuzzy Hash: 5C90022A25340013D1807158654860A101587D2202FD5D465A4016558CCB1989695325
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: d6cb19520bafd1b3c9c89fffaa34ddd42c6ec2d3ebd04de750da82a3d5175e13
                                  • Instruction ID: 27da4a90659912e947960160dd0d6973b340989c61fdaae5c6c0e72b70a175b0
                                  • Opcode Fuzzy Hash: d6cb19520bafd1b3c9c89fffaa34ddd42c6ec2d3ebd04de750da82a3d5175e13
                                  • Instruction Fuzzy Hash: DE900222282441635545B1585544507501697E12417D5C062A5415950C872A9956D725
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 9dacabb9bdca087b5a5ddf3596d0d8a2aa67a1c26c090e01b7b6dc29c2b279c4
                                  • Instruction ID: 6c4fef88e2937e50f799f58da54234f2636dce33d731479a7bb56ed65c1a3707
                                  • Opcode Fuzzy Hash: 9dacabb9bdca087b5a5ddf3596d0d8a2aa67a1c26c090e01b7b6dc29c2b279c4
                                  • Instruction Fuzzy Hash: 6C90023224140423D11171585644707101987D1241FD5C462A4425558D975A8A52A225
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 922460b37b30157adabc52bda4f30aac611126d74bdb9ac417d877f151a6c500
                                  • Instruction ID: 01dd380c64b7e5555081f0b118d327e37ffc84cd5d3df435faf1c5fc79c9c607
                                  • Opcode Fuzzy Hash: 922460b37b30157adabc52bda4f30aac611126d74bdb9ac417d877f151a6c500
                                  • Instruction Fuzzy Hash: A590023224148813D1107158954474A101587D1301F99C461A8425658D879989917225
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: f6b83c4ccafdfce0155d4ae13e235336ff218ff47348e27409c74b08f9046651
                                  • Instruction ID: 57ce3c0a9f20afd5e126be5779ceab2e67b706191a6cfad0d0c7dbe308212710
                                  • Opcode Fuzzy Hash: f6b83c4ccafdfce0155d4ae13e235336ff218ff47348e27409c74b08f9046651
                                  • Instruction Fuzzy Hash: 1890023224140853D10071585544B46101587E1301F95C066A4125654D8719C9517625
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 6e3161a1091248f7fb9f4a7811e3970cb89d031b6cd2a601b4c728fe5194fc66
                                  • Instruction ID: 031146b8510dd5d3fa253989c8e5ddb0817a0d049c5c32f0d2d28b3c42045da6
                                  • Opcode Fuzzy Hash: 6e3161a1091248f7fb9f4a7811e3970cb89d031b6cd2a601b4c728fe5194fc66
                                  • Instruction Fuzzy Hash: 1C90023224140413D10075986548646101587E1301F95D061A9025555EC76989916235
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 19b32615d852bcc50e7000f4a1d730f295544924979107fad2e78a4697bdd718
                                  • Instruction ID: bd7bf787a2f2b0aed7730c1e367a4c4c368f697f686aaf22a5587c3908ea4123
                                  • Opcode Fuzzy Hash: 19b32615d852bcc50e7000f4a1d730f295544924979107fad2e78a4697bdd718
                                  • Instruction Fuzzy Hash: EB90026238140453D10071585554B061015C7E2301F95C065E5065554D871DCD52622A
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 402c48d2fe34afb24a20bffa02272ab2c5edfcfa4515b78b1f65c8c7db663b0c
                                  • Instruction ID: 8559cc5d8a131d393e1a70fda3f94274c24d8342115d29b0528e1f5bbfcedf0b
                                  • Opcode Fuzzy Hash: 402c48d2fe34afb24a20bffa02272ab2c5edfcfa4515b78b1f65c8c7db663b0c
                                  • Instruction Fuzzy Hash: FF900222251C0053D20075685D54B07101587D1303F95C165A4155554CCB1989615625
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 1179b1e2f52ca12727e822348a8b39de3d2173d2f7d3e8edd71dcd954aed42b0
                                  • Instruction ID: 5730515212fa4aef9ad3e9c1d29807c51cd76cb8307d228c49653ecc71e96692
                                  • Opcode Fuzzy Hash: 1179b1e2f52ca12727e822348a8b39de3d2173d2f7d3e8edd71dcd954aed42b0
                                  • Instruction Fuzzy Hash: DC90027224140413D14071585544746101587D1301F95C061A9065554E875D8ED56769
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 00a65b966538e2bda27a99c9ae031e83122882ae693621f066608be8086b3a06
                                  • Instruction ID: 22b4b25cd463b977ebe53ffdbdf905f5d573457127d1a11c0c4de330c94839de
                                  • Opcode Fuzzy Hash: 00a65b966538e2bda27a99c9ae031e83122882ae693621f066608be8086b3a06
                                  • Instruction Fuzzy Hash: 5B90026224240013410571585554616501A87E1201B95C071E5015590DC72989916229
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: c7f57b1d27b1609de7f8b591cfe72b06350ff9d5e51fe201e4e8e73a3995e69f
                                  • Instruction ID: 623e0d8ab676402278bbcd0e44c189d61a4576336193bf1c8d40c384e1e6f706
                                  • Opcode Fuzzy Hash: c7f57b1d27b1609de7f8b591cfe72b06350ff9d5e51fe201e4e8e73a3995e69f
                                  • Instruction Fuzzy Hash: AE90023224140813D1807158554464A101587D2301FD5C065A4026654DCB198B5977A5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 1f1cb535f3a249d489861e190291a29074459cdfdb39d2b37ee5acd29d18857a
                                  • Instruction ID: cac07237e7260bf4375276b3674b2e90aa9155b3817dbe12df0b1219d2517366
                                  • Opcode Fuzzy Hash: 1f1cb535f3a249d489861e190291a29074459cdfdb39d2b37ee5acd29d18857a
                                  • Instruction Fuzzy Hash: 0590023224544853D14071585544A46102587D1305F95C061A4065694D97298E55B765
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: b78a472109f80edba1b56a8b263f828fdf08a7d6e90a55f2d0ac6a6e7810a8c5
                                  • Instruction ID: 3fcbeb511223a55abea22332ec0bd7df39baa1ab6c9ca0a0e19a7c38c37eb121
                                  • Opcode Fuzzy Hash: b78a472109f80edba1b56a8b263f828fdf08a7d6e90a55f2d0ac6a6e7810a8c5
                                  • Instruction Fuzzy Hash: 5F900437351400130105F55C17445071057C7D73513D5C071F5017550CD735CD715335

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 398 2e89040-2e89082 call 2e8bd00 401 2e89088-2e890d8 call 2e8bdd0 call 2e7ace0 call 2e84e40 398->401 402 2e8915c-2e89162 398->402 409 2e890e0-2e890f1 Sleep 401->409 410 2e890f3-2e890f9 409->410 411 2e89156-2e8915a 409->411 412 2e890fb-2e89121 call 2e88c60 410->412 413 2e89123-2e89144 call 2e88e70 410->413 411->402 411->409 417 2e89149-2e8914c 412->417 413->417 417->411
                                  APIs
                                  • Sleep.KERNELBASE(000007D0), ref: 02E890E8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID: net.dll$wininet.dll
                                  • API String ID: 3472027048-1269752229
                                  • Opcode ID: e000aacb62b8a3652c6929c748928486c5a2ca362115a4fae910f14d5476fb0a
                                  • Instruction ID: 6c5931fe140740d4dbcff12168fa05e4e134e341b62c44794c850894af801563
                                  • Opcode Fuzzy Hash: e000aacb62b8a3652c6929c748928486c5a2ca362115a4fae910f14d5476fb0a
                                  • Instruction Fuzzy Hash: 79318FB2944645BBC724EF64C885FBBB7B9AB48B04F10C01DF66EAB245D730A510CBA4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 418 2e89038-2e89039 419 2e89029-2e89035 418->419 420 2e8903b-2e8906f 418->420 421 2e8907b-2e89082 420->421 422 2e89076 call 2e8bd00 420->422 423 2e89088-2e890d8 call 2e8bdd0 call 2e7ace0 call 2e84e40 421->423 424 2e8915c-2e89162 421->424 422->421 431 2e890e0-2e890f1 Sleep 423->431 432 2e890f3-2e890f9 431->432 433 2e89156-2e8915a 431->433 434 2e890fb-2e89121 call 2e88c60 432->434 435 2e89123-2e89144 call 2e88e70 432->435 433->424 433->431 439 2e89149-2e8914c 434->439 435->439 439->433
                                  APIs
                                  • Sleep.KERNELBASE(000007D0), ref: 02E890E8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID: net.dll$wininet.dll
                                  • API String ID: 3472027048-1269752229
                                  • Opcode ID: 2c7ae25df7590c84330c50be191f47c7db054d0f22cd49728a0a6f04b093de36
                                  • Instruction ID: 0af152408bc563968f86e88dd55c75e18bcce39197dad2b8a41314b0aa904294
                                  • Opcode Fuzzy Hash: 2c7ae25df7590c84330c50be191f47c7db054d0f22cd49728a0a6f04b093de36
                                  • Instruction Fuzzy Hash: AC31DF72984244ABCB14EFA4D885BBBB7B4BB48704F00805DEA6D9B385D770A520CBA5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 546 2e8a622-2e8a62b 547 2e8a62d-2e8a647 call 2e8af20 546->547 548 2e8a5b5 546->548 550 2e8a64c-2e8a661 RtlFreeHeap 547->550
                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,02E73AF8), ref: 02E8A65D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID: .z`
                                  • API String ID: 3298025750-1441809116
                                  • Opcode ID: 47e17a99976d0ae04a9a0be326f9606404c1efdd0bbcd6b63131e211ecf4ced3
                                  • Instruction ID: a0278038f09c825719c615f30f281acc3b581b77a15b3de9a8fda43887c30b7a
                                  • Opcode Fuzzy Hash: 47e17a99976d0ae04a9a0be326f9606404c1efdd0bbcd6b63131e211ecf4ced3
                                  • Instruction Fuzzy Hash: FAF0A0B12403106FDB18DF58DC48EA7B7AAAF44710F004529F94C4B361C271E9018BF0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 551 2e8a630-2e8a646 552 2e8a64c-2e8a661 RtlFreeHeap 551->552 553 2e8a647 call 2e8af20 551->553 553->552
                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,02E73AF8), ref: 02E8A65D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID: .z`
                                  • API String ID: 3298025750-1441809116
                                  • Opcode ID: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                  • Instruction ID: f821f549d7a5f3c76596ccf6c45b20be1dd6a5e6ddfe484664682d8171e9b908
                                  • Opcode Fuzzy Hash: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                  • Instruction Fuzzy Hash: 42E012B2200208ABDB18EF99DC48EA777ADAF88750F018559BA1C5B241C630E9108AB0

                                  Control-flow Graph

                                  APIs
                                  • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 02E7836A
                                  • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 02E7838B
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MessagePostThread
                                  • String ID:
                                  • API String ID: 1836367815-0
                                  • Opcode ID: 52d28f0956c33e3c57895f129aba87583ea191acc9a1f2ae8834876586fad188
                                  • Instruction ID: 3a326c418b6222899609f826654b506b9c8d8ba9abd8b0bc988f87885da5a732
                                  • Opcode Fuzzy Hash: 52d28f0956c33e3c57895f129aba87583ea191acc9a1f2ae8834876586fad188
                                  • Instruction Fuzzy Hash: 0B01D832AC12297BE720A6949C46FFE772C5B00B65F044229FF08BA1C1E694690647F1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 570 2e78310-2e7831f 571 2e78328-2e7835a call 2e8c9c0 call 2e7ace0 call 2e84e40 570->571 572 2e78323 call 2e8be20 570->572 579 2e7838e-2e78392 571->579 580 2e7835c-2e7836e PostThreadMessageW 571->580 572->571 581 2e78370-2e7838b call 2e7a470 PostThreadMessageW 580->581 582 2e7838d 580->582 581->582 582->579
                                  APIs
                                  • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 02E7836A
                                  • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 02E7838B
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MessagePostThread
                                  • String ID:
                                  • API String ID: 1836367815-0
                                  • Opcode ID: f2c01e1818d052739ee633fa7746fb4f3ba52e36b8bad28e88873d1147d52be0
                                  • Instruction ID: 9c0a8bcb1e9c000ab88769d0b076aa1f1d8a87c295b336ac5880695c4dca217f
                                  • Opcode Fuzzy Hash: f2c01e1818d052739ee633fa7746fb4f3ba52e36b8bad28e88873d1147d52be0
                                  • Instruction Fuzzy Hash: 7801A732AC02287BE720B6949C06FFE776D5B40B54F048159FF48BA1C1E694690547F5
                                  APIs
                                  • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,02E7F040,?,?,00000000), ref: 02E891AC
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread
                                  • String ID:
                                  • API String ID: 2422867632-0
                                  • Opcode ID: 7fc8339ce7be46f6138d1ec41cf9d4779d79bd09c42d294e3f322aea3a094e9c
                                  • Instruction ID: 7b45861309b35d9e1c502b008dac0bf070651a301ef8c7473539b6a8837db622
                                  • Opcode Fuzzy Hash: 7fc8339ce7be46f6138d1ec41cf9d4779d79bd09c42d294e3f322aea3a094e9c
                                  • Instruction Fuzzy Hash: 3541AE72A80705ABD728EF64CC84FE7B3A9BF44708F509519F56D97281DB70B9208BA4
                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,02E7F1C2,02E7F1C2,?,00000000,?,?), ref: 02E8A7C0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: d9035ca6a8f0a07f8a0727fed66838573f97e2a0292d15142870282e1222b481
                                  • Instruction ID: f8bf46819fb236f319b85a8a567859049ff49c2106a056b359c77bda436dceab
                                  • Opcode Fuzzy Hash: d9035ca6a8f0a07f8a0727fed66838573f97e2a0292d15142870282e1222b481
                                  • Instruction Fuzzy Hash: BC1170B62002086FCB14DF59DC85FEB37ADEF88310F04C16AFA4C57245C634A8048BB0
                                  APIs
                                  • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 02E7AD52
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Load
                                  • String ID:
                                  • API String ID: 2234796835-0
                                  • Opcode ID: 343ab67df369899ddd45e960eb1e1cf1cc0407856a101373337c9296a528243f
                                  • Instruction ID: 685fd4e34e244b98036a135876cfe54c39bec5463edf5febbf95ef23340b042a
                                  • Opcode Fuzzy Hash: 343ab67df369899ddd45e960eb1e1cf1cc0407856a101373337c9296a528243f
                                  • Instruction Fuzzy Hash: 4F015EB6D4020DABDB10EAE0EC41FDEB3799B0430CF1085A5EA0C97290FA30E704CB91
                                  APIs
                                  • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 02E8A6F4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateInternalProcess
                                  • String ID:
                                  • API String ID: 2186235152-0
                                  • Opcode ID: be5023f689f342393e529da6d3c81613aede66d4b02574e8c1b36051d5e76feb
                                  • Instruction ID: a6993cd4a7a15de31878536eb82ec034024a50ec89ce44738a1e94c86f81560a
                                  • Opcode Fuzzy Hash: be5023f689f342393e529da6d3c81613aede66d4b02574e8c1b36051d5e76feb
                                  • Instruction Fuzzy Hash: 8901AFB2204108BFCB54DF99DC81EEB77AAAF8C354F158258FA5DE7240C630E851CBA0
                                  APIs
                                  • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 02E8A6F4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateInternalProcess
                                  • String ID:
                                  • API String ID: 2186235152-0
                                  • Opcode ID: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                  • Instruction ID: f3787b614ae7021ac2ebf50fdb0b6403179843c98f0bd4a8ee1c760d4c500db3
                                  • Opcode Fuzzy Hash: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                  • Instruction Fuzzy Hash: D901AFB2210108AFCB54DF89DC80EEB77AEAF8C754F158258BA0D97240C630E851CBA4
                                  APIs
                                  • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,02E7F040,?,?,00000000), ref: 02E891AC
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread
                                  • String ID:
                                  • API String ID: 2422867632-0
                                  • Opcode ID: 3ca6a205792d7ef5e9bf1524afc8b1dc678e378c6025c1e3997efacd26045c0b
                                  • Instruction ID: e4704fc2355eed44323f593f1e7c3e36ac86ba873c756206c7c4e1b470fca009
                                  • Opcode Fuzzy Hash: 3ca6a205792d7ef5e9bf1524afc8b1dc678e378c6025c1e3997efacd26045c0b
                                  • Instruction Fuzzy Hash: BBE06D773802043AE3207599AC02FA7B39DCB91B24F554026FA4DEB6C1D595F40146A5
                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,02E7F1C2,02E7F1C2,?,00000000,?,?), ref: 02E8A7C0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: c6adb4c480c9bb5847745c6f566e24df256e7eeba402b41462e436d2acfb2651
                                  • Instruction ID: 5a9d97e605d5b455e4a853ac8564a53f364c09aaf90a7f93efd1aa09a217596a
                                  • Opcode Fuzzy Hash: c6adb4c480c9bb5847745c6f566e24df256e7eeba402b41462e436d2acfb2651
                                  • Instruction Fuzzy Hash: 5BF0A0B1204290AFDB10EF18DC88EA77BE8EF45210F14869AF8D95B642C630E805CBA1
                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,02E7F1C2,02E7F1C2,?,00000000,?,?), ref: 02E8A7C0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                  • Instruction ID: 3ec051af848c3bf0313ef89238660bb4b0a818243e5ef1f1c1fa3b533aefaa2d
                                  • Opcode Fuzzy Hash: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                  • Instruction Fuzzy Hash: 55E01AB22002086BDB10EF49DC84EE737ADAF88650F018165BA0C57241CA34E8108BF5
                                  APIs
                                  • RtlAllocateHeap.NTDLL(02E84526,?,02E84C9F,02E84C9F,?,02E84526,?,?,?,?,?,00000000,00000000,?), ref: 02E8A61D
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                  • Instruction ID: a5dc8216758f0be836f07053e311840c1d4ff64d062252daeba73ed39d8751f9
                                  • Opcode Fuzzy Hash: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                  • Instruction Fuzzy Hash: 6CE012B2200208ABDB14EF99DC40EA777ADAF88654F118559BA1C5B241C630F9108AB0
                                  APIs
                                  • SetErrorMode.KERNELBASE(00008003,?,02E78D14,?), ref: 02E7F6EB
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: ede5fa31a831e471f4145dc2080d524348b1f53034f0f534d089b74ce1f6017c
                                  • Instruction ID: 3562eff84a6ef3a405b2d8db4958bedf4e481be0599bcf2d78db44f086cf8ea8
                                  • Opcode Fuzzy Hash: ede5fa31a831e471f4145dc2080d524348b1f53034f0f534d089b74ce1f6017c
                                  • Instruction Fuzzy Hash: D0D0A7926A834526E710BAB05C02F0726440B01644F0945A4A58CEE0C3D848C0140135
                                  APIs
                                  • SetErrorMode.KERNELBASE(00008003,?,02E78D14,?), ref: 02E7F6EB
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502522007.0000000002E70000.00000040.80000000.00040000.00000000.sdmp, Offset: 02E70000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_2e70000_msdt.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: a2d4a72b799ecba535e6209a82b178d001bd83fc2549ccaf7422d872a4b8c7e9
                                  • Instruction ID: 4a868144a8c845848e58a41721009fdc1ede641b282477b90c6fe5a3f76606bc
                                  • Opcode Fuzzy Hash: a2d4a72b799ecba535e6209a82b178d001bd83fc2549ccaf7422d872a4b8c7e9
                                  • Instruction Fuzzy Hash: 21D05E626903092BE610BAA49C02F263289AB44A04F494064FA4C9B2C3E954E0004565
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4503940124.0000000005090000.00000040.00001000.00020000.00000000.sdmp, Offset: 05090000, based on PE: true
                                  • Associated: 00000005.00000002.4503940124.00000000051B9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.00000000051BD000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  • Associated: 00000005.00000002.4503940124.000000000522E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_5090000_msdt.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: f73548c58b926bbd2d63779149662b7e87a77eb3b4c0fcb030cfea7d139a935f
                                  • Instruction ID: 22192b9be417d1c3ca1a09a7744fedc7cd65cbe7572e33113461f8977b2d3533
                                  • Opcode Fuzzy Hash: f73548c58b926bbd2d63779149662b7e87a77eb3b4c0fcb030cfea7d139a935f
                                  • Instruction Fuzzy Hash: FEB02B328014C0C6DA00E320470CB17390077C1300F25C071D2030281E033CC0C0E275
                                  APIs
                                  • VariantInit.OLEAUT32(?), ref: 002C284C
                                  • CoCreateInstance.OLE32(002848D8,00000000,00000015,00284898,00000000,?,?,?,?,?,?,?,002C2CE0,?,00000000,00000000), ref: 002C2863
                                  • SysFreeString.OLEAUT32(00000000), ref: 002C2A63
                                  • SysStringLen.OLEAUT32(00000000), ref: 002C2A93
                                  • GetProcessHeap.KERNEL32(00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,002C2CE0,?,00000000), ref: 002C2AA0
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,002C2CE0,?,00000000,00000000), ref: 002C2AA7
                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,00000001,00000000,00000001,00000000,00000000), ref: 002C2ACC
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,002C2CE0,?,00000000,00000000,00000000), ref: 002C2AD6
                                  • VariantClear.OLEAUT32(?), ref: 002C2AF7
                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?,002C2CE0,?), ref: 002C2B20
                                  • VariantClear.OLEAUT32(?), ref: 002C2BDE
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,002C2CE0,?,00000000,00000000,00000000), ref: 002C2BEB
                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,002C2CE0,?,00000000,00000000,00000000,?,?,002B3ACA), ref: 002C2BF2
                                  • SysFreeString.OLEAUT32(00000000), ref: 002C2C6D
                                    • Part of subcall function 002C1DB3: FindResourceW.KERNEL32(00000000,00000000,00000017,00000000,00000000,00000000,?,?,?,?,?,?,002B645E,?,?), ref: 002C1DCC
                                    • Part of subcall function 002C1DB3: GetLastError.KERNEL32(?,?,?,?,?,?,002B645E,?,?), ref: 002C1DE0
                                    • Part of subcall function 002C1DB3: LoadResource.KERNEL32(?,00000000,?,?,?,?,?,?,002B645E,?,?), ref: 002C1E02
                                    • Part of subcall function 002C1DB3: GetLastError.KERNEL32(?,?,?,?,?,?,002B645E,?,?), ref: 002C1E13
                                    • Part of subcall function 002C1DB3: LockResource.KERNEL32(00000000,?,?,?,?,?,?,002B645E,?,?), ref: 002C1E34
                                    • Part of subcall function 002C1DB3: FreeResource.KERNEL32(00000000,?,?,?,?,?,?,002B645E,?,?), ref: 002C1EF6
                                    • Part of subcall function 002C1DB3: GlobalUnlock.KERNEL32(00000000), ref: 002C1F03
                                    • Part of subcall function 002C1DB3: GlobalFree.KERNEL32(00000000), ref: 002C1F12
                                    • Part of subcall function 002C1F21: SysFreeString.OLEAUT32(00000000), ref: 002C1FEB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Free$HeapResourceString$ErrorGlobalLastVariant$ClearCreateProcess$AllocByteCharFindInitInstanceLoadLockMultiStreamUnlockWide
                                  • String ID: //cultureName$//token$ENVELOPE.XML$POST$SOAPAction: "http://diagnostics.microsoft.com/QueryQueue"Content-Type: text/xml; charset=UTF-8$,,
                                  • API String ID: 832141878-2015901345
                                  • Opcode ID: 8b34ec997623bea9d9d0b90cb54cce1377482e6b1dd77a63cbc4c9bed50cd8c3
                                  • Instruction ID: 94ee321ad7b5313adb9657d64eff8737c865a6bb08102ff8b13845c2731d03ae
                                  • Opcode Fuzzy Hash: 8b34ec997623bea9d9d0b90cb54cce1377482e6b1dd77a63cbc4c9bed50cd8c3
                                  • Instruction Fuzzy Hash: F6D1BE36A1061ADFCB01DFA4D858FAEBBB5EF88721F15416DE401A7260DF31AD49CB90
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000208,00000000,00000000,00000000), ref: 002B604E
                                  • HeapAlloc.KERNEL32(00000000), ref: 002B6055
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B621C
                                  • HeapFree.KERNEL32(00000000), ref: 002B6223
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFreePrint
                                  • String ID: %s\%s$%s\*$DeleteDirectory$Dwz ERROR: %s:%d - hr = 0x%08X$Dwz WARNING: %s:%d - hr = 0x%08X
                                  • API String ID: 1330678134-3297311575
                                  • Opcode ID: 85dea343bd0653613dc54b37c49cfa97cbb72e7ba9dbbac539e2dc5135079d40
                                  • Instruction ID: 2112997ce528a9f5a1dc74835ded4676d5a2af51dd47ceb5028eb2b5ac14041b
                                  • Opcode Fuzzy Hash: 85dea343bd0653613dc54b37c49cfa97cbb72e7ba9dbbac539e2dc5135079d40
                                  • Instruction Fuzzy Hash: E8411C75B722226BFB206B699D0EFFB375CAB05B95F040015FD05E52C2EB69CC6086B0
                                  APIs
                                  • memset.MSVCRT ref: 002C60E1
                                  • GetProcessHeap.KERNEL32(00000000,00000208,00000000,00000000,?), ref: 002C60F1
                                  • HeapAlloc.KERNEL32(00000000), ref: 002C60F8
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 002C6226
                                  • HeapFree.KERNEL32(00000000), ref: 002C622D
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002C623A
                                  • HeapFree.KERNEL32(00000000), ref: 002C6241
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free$AllocPrintmemset
                                  • String ID: %s\%s$%s\*.%s$Met ERROR: %s:%d - hr = 0x%08X$PackageCollection::FindConfigFile$diagcfg
                                  • API String ID: 4155511367-317019626
                                  • Opcode ID: 34dc35b305128b4c9563adf472c9360fe2a42ad0c0378749b70c41c2c4099e75
                                  • Instruction ID: c71c0b4fc34a677c06ca37156deb810c9ef47fd7516fcac3fba318cc00e3795a
                                  • Opcode Fuzzy Hash: 34dc35b305128b4c9563adf472c9360fe2a42ad0c0378749b70c41c2c4099e75
                                  • Instruction Fuzzy Hash: 97417D72AA53016BD7216BA49C4EF5B3B989B45B21F04021DFD08972D2DAF5DC204BA2
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000208,?,00000000,?,?,002AD685,?), ref: 002AD8C6
                                  • HeapAlloc.KERNEL32(00000000,?,?,002AD685,?), ref: 002AD8CD
                                  • SysFreeString.OLEAUT32(00000000), ref: 002ADCB4
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002ADCBD
                                  • HeapFree.KERNEL32(00000000), ref: 002ADCC4
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  • Configuration::LoadDisplayNodesFromFile, xrefs: 002AD8E4, 002AD924, 002ADC9B
                                  • cfg:PackageConfiguration/cfg:Execution/cfg:Description, xrefs: 002AD9A5
                                  • cfg:PackageConfiguration/cfg:Index/cfg:RequiresAdminPrivileges, xrefs: 002ADAD9
                                  • cfg:PackageConfiguration/cfg:Execution/cfg:Name, xrefs: 002AD904
                                  • cfg:PackageConfiguration/cfg:Index/cfg:Id, xrefs: 002ADB6B
                                  • cfg:PackageConfiguration/cfg:Index/cfg:Category, xrefs: 002ADC12
                                  • cfg:PackageConfiguration/cfg:Index/cfg:PublisherName, xrefs: 002ADA96
                                  • true, xrefs: 002ADB00
                                  • cfg:PackageConfiguration/cfg:Index/cfg:Version, xrefs: 002ADB2F
                                  • cfg:PackageConfiguration/cfg:Execution/cfg:Icon, xrefs: 002ADBA7
                                  • cfg:PackageConfiguration/cfg:Index/cfg:PrivacyUrl, xrefs: 002ADA34
                                  • https://, xrefs: 002ADA60
                                  • http://, xrefs: 002ADA4B
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002AD8E9, 002AD929, 002ADCA0
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess$AllocPrintString
                                  • String ID: Configuration::LoadDisplayNodesFromFile$Dwz ERROR: %s:%d - hr = 0x%08X$cfg:PackageConfiguration/cfg:Execution/cfg:Description$cfg:PackageConfiguration/cfg:Execution/cfg:Icon$cfg:PackageConfiguration/cfg:Execution/cfg:Name$cfg:PackageConfiguration/cfg:Index/cfg:Category$cfg:PackageConfiguration/cfg:Index/cfg:Id$cfg:PackageConfiguration/cfg:Index/cfg:PrivacyUrl$cfg:PackageConfiguration/cfg:Index/cfg:PublisherName$cfg:PackageConfiguration/cfg:Index/cfg:RequiresAdminPrivileges$cfg:PackageConfiguration/cfg:Index/cfg:Version$http://$https://$true
                                  • API String ID: 1832064931-695189017
                                  • Opcode ID: b5d6733659c915f5ea7d262a38ab188ad1fb6efed5b3f9409680b2495318e099
                                  • Instruction ID: 75bb4d522b181f198af4258423f68747ac8ac8e7ded7ee7339bb5d88f55735e2
                                  • Opcode Fuzzy Hash: b5d6733659c915f5ea7d262a38ab188ad1fb6efed5b3f9409680b2495318e099
                                  • Instruction Fuzzy Hash: 8CB14D31E31222E7DB21EB509D09BAF76759F82B24F210155F906BB681DF70DE2187D0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000800), ref: 00296030
                                  • HeapAlloc.KERNEL32(00000000), ref: 00296037
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 002962E0
                                  • HeapFree.KERNEL32(00000000), ref: 002962E7
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$FinalLinksPage::CreateLinks$commandLink$linkSpacer$links
                                  • API String ID: 1330678134-3043663391
                                  • Opcode ID: 4313c459f3ad65797f43c9cd07fe7f379935bd7d5db1d0b0102b195a1577206d
                                  • Instruction ID: 6c672a6e1346f6e51f3017ab1fad96327fac5c6b7aaf1298d7e178df307d3528
                                  • Opcode Fuzzy Hash: 4313c459f3ad65797f43c9cd07fe7f379935bd7d5db1d0b0102b195a1577206d
                                  • Instruction Fuzzy Hash: 4D819F79B60615ABEF019BA0DC1CF6A3BBAABC8710F11006AFD06E7391DE74DD158B10
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000800), ref: 002968ED
                                  • HeapAlloc.KERNEL32(00000000), ref: 002968F4
                                  • StrToID.DUI70(txtResult), ref: 00296915
                                  • ?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z.DUI70(?), ref: 00296922
                                  • SysFreeString.OLEAUT32(00000000), ref: 00296ABB
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00296ACC
                                  • HeapFree.KERNEL32(00000000), ref: 00296AD3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess$AllocDescendent@DirectElement@FindStringV12@
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$FinalLinksPage::SetupRootCauseResult$checkicon$failicon$rcpic$txtResult$warningicon
                                  • API String ID: 3080287452-3118468517
                                  • Opcode ID: ca5b0c24781b96c30a765b107b93ddc43f949629162251cb7d38e974c6c836c1
                                  • Instruction ID: f62ed65fc292055b19bbac32236675e7f6ce07f575bdf39f6fa9d16f42c677c3
                                  • Opcode Fuzzy Hash: ca5b0c24781b96c30a765b107b93ddc43f949629162251cb7d38e974c6c836c1
                                  • Instruction Fuzzy Hash: 7751D231A61326ABEF219B64DC1DFAE3BA4AF04760F208126FD05F7391DA70DD209790
                                  APIs
                                  • memset.MSVCRT ref: 002A2999
                                  • GetProcessHeap.KERNEL32(00000000,00000098,00000000,00000000,00000000), ref: 002A29B0
                                  • HeapAlloc.KERNEL32(00000000), ref: 002A29B7
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002A2C02
                                  • HeapFree.KERNEL32(00000000), ref: 002A2C09
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFreePrintmemset
                                  • String ID: 4$Dwz ERROR: %s:%d - hr = 0x%08X$MSFTEDIT.DLL$Mode::DisplayWizard$e&*$k
                                  • API String ID: 1428516714-31844290
                                  • Opcode ID: f181a1308cb5e5122d95395a3d5f34776321421dd4ab276b7354af8c6bc9b229
                                  • Instruction ID: 2cc01761db994c84a24f224652a7610e056657d809504c020d00f0dc75930da8
                                  • Opcode Fuzzy Hash: f181a1308cb5e5122d95395a3d5f34776321421dd4ab276b7354af8c6bc9b229
                                  • Instruction Fuzzy Hash: AC71FB71E62365DBDB21EFA8DC4AB9E7BA4AF05750F004125F905BB381DBB09C188B90
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000208), ref: 002CD83F
                                  • HeapAlloc.KERNEL32(00000000), ref: 002CD846
                                  • GetProcessHeap.KERNEL32(00000000,00000208), ref: 002CD860
                                  • HeapAlloc.KERNEL32(00000000), ref: 002CD867
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002CD91B
                                  • HeapFree.KERNEL32(00000000), ref: 002CD922
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002CD92F
                                  • HeapFree.KERNEL32(00000000), ref: 002CD936
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID: PLA_
                                  • API String ID: 756756679-2172622395
                                  • Opcode ID: f067728021f586ddf7d70c67394b10923fdb40e6f1e8d655998110de6e90245c
                                  • Instruction ID: 650b3078e4757c5367a0fbc3382a170ec8e362d034faacdbd367f635f64294cd
                                  • Opcode Fuzzy Hash: f067728021f586ddf7d70c67394b10923fdb40e6f1e8d655998110de6e90245c
                                  • Instruction Fuzzy Hash: 2121B47AD61222A7D7601BB56C0CF6B7B68AB48B62B11033AFD05D7191DA74CC1096F0
                                  APIs
                                  • SysFreeString.OLEAUT32(00000000), ref: 002BE970
                                  • SysFreeString.OLEAUT32(00000000), ref: 002BE983
                                  • SysFreeString.OLEAUT32(00000000), ref: 002BE996
                                  • SetDllDirectoryW.KERNEL32(00000000), ref: 002BEB1F
                                  • GetLastError.KERNEL32 ref: 002BEB29
                                  • SetDllDirectoryW.KERNEL32(00000000), ref: 002BEB49
                                  • GetLastError.KERNEL32 ref: 002BEB53
                                  • SysFreeString.OLEAUT32(00000000), ref: 002BEC93
                                  • SysFreeString.OLEAUT32(00000000), ref: 002BECA6
                                  • SysFreeString.OLEAUT32(00000000), ref: 002BECB9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeString$DirectoryErrorLast
                                  • String ID: ./ExtensionPoint/HelpKeywords$./ExtensionPoint/Icon$./ExtensionPoint/Maintenance$Dwz ERROR: %s:%d - hr = 0x%08X$Dwz IGNORED: %s:%d - hr = 0x%08X$Packages_SetupExtension
                                  • API String ID: 3494661656-1426940508
                                  • Opcode ID: b3dc6e2ec1ca1af51cb7b40b35bf76464180ccf395b0679abbd8373ee77095d3
                                  • Instruction ID: ae32c1b12c2986232f2f047fdc4e1381a1079402cfd41b456e7fd47f7925e84f
                                  • Opcode Fuzzy Hash: b3dc6e2ec1ca1af51cb7b40b35bf76464180ccf395b0679abbd8373ee77095d3
                                  • Instruction Fuzzy Hash: 3ED1EF31E202169FDF109FA0C849BEEBBB5FF88761F16405AE402B7290CB74AD51DB91
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000800,?,00000000,00000000,00000000,00000000,00000000), ref: 002CB167
                                  • HeapAlloc.KERNEL32(00000000), ref: 002CB16E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$AllocProcess
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$MetParseLocaleString
                                  • API String ID: 1617791916-297750522
                                  • Opcode ID: a24a55ef1b1c0f809a0824364bcc7df002eb1db38e4408a0956ae7f9278849dc
                                  • Instruction ID: f5cf982e1ece73bdfbbcb9eec1e1f097c14059004de8cda16ce7f8968af10518
                                  • Opcode Fuzzy Hash: a24a55ef1b1c0f809a0824364bcc7df002eb1db38e4408a0956ae7f9278849dc
                                  • Instruction Fuzzy Hash: 4F41D875AA1306ABFB221BA46C0FF7A3768DB05B11F10421AFD05EB1D1EBB4CC5087A5
                                  APIs
                                  • memset.MSVCRT ref: 002B397E
                                    • Part of subcall function 002B34A3: GetProcessHeap.KERNEL32(00000000,00000800,00000001,00000000,00000000,002BCD24,00000001,00000000,Dwz ERROR: %s:%d - hr = 0x%08X,?,?,?,002B2B99), ref: 002B34B2
                                    • Part of subcall function 002B34A3: HeapAlloc.KERNEL32(00000000,?,?,?,002B2B99), ref: 002B34B9
                                  • GetProcessHeap.KERNEL32(00000000,00000208,00000001,00000000,Dwz ERROR: %s:%d - hr = 0x%08X,00000107,00000000,00000102,00000000,0000006C,00000000,00000061,00000000,0000007C,00000000,0000005C), ref: 002B39CA
                                  • HeapAlloc.KERNEL32(00000000), ref: 002B39D1
                                  • GetProcessHeap.KERNEL32(00000000,00000800), ref: 002B3A63
                                  • HeapAlloc.KERNEL32(00000000), ref: 002B3A6A
                                  • DeleteFileW.KERNEL32(00000000,?,?), ref: 002B3B35
                                  • GetLastError.KERNEL32 ref: 002B3B43
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B3B80
                                  • HeapFree.KERNEL32(00000000), ref: 002B3B87
                                    • Part of subcall function 002A3E3B: GetProcessHeap.KERNEL32(00000000,?), ref: 002A3E53
                                    • Part of subcall function 002A3E3B: HeapFree.KERNEL32(00000000), ref: 002A3E5A
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 002B3B90
                                  • HeapFree.KERNEL32(00000000), ref: 002B3B97
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree$DeleteErrorFileLastmemset
                                  • String ID: %s\%s$Dwz ERROR: %s:%d - hr = 0x%08X$ReuploadFiles$results.cab
                                  • API String ID: 1779702763-1160677305
                                  • Opcode ID: 0c85a2113c60f00ceaa6e0a5f4fe05fa37ca194f4961be3db3751210caa506fb
                                  • Instruction ID: 0b34337276fb2892650766a677b7ff43f336b7aed2f4226edce339fd81254521
                                  • Opcode Fuzzy Hash: 0c85a2113c60f00ceaa6e0a5f4fe05fa37ca194f4961be3db3751210caa506fb
                                  • Instruction Fuzzy Hash: 7E513C71E7262567EB11EBA49C0DFEB7B689B107A0F110119FA05BB3C2D9E09D2487E0
                                  APIs
                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 002BA839
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002BA85D
                                  • HeapFree.KERNEL32(00000000), ref: 002BA864
                                  • GetProcessHeap.KERNEL32(00000000,00000800), ref: 002BA870
                                  • HeapAlloc.KERNEL32(00000000), ref: 002BA877
                                  • OpenEventW.KERNEL32(00000002,00000000,00000000,0028A300,00000000), ref: 002BA8BB
                                  • AllowSetForegroundWindow.USER32(000000FF), ref: 002BA8CD
                                  • SetEvent.KERNEL32(00000000), ref: 002BA8D4
                                  • GetLastError.KERNEL32 ref: 002BA8E2
                                  • SetForegroundWindow.USER32(00000000), ref: 002BA912
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  • CloseHandle.KERNEL32(00000000), ref: 002BA98E
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002BA99A
                                  • HeapFree.KERNEL32(00000000), ref: 002BA9A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$EventForegroundFreeWindow$AllocAllowCloseErrorHandleLastMultipleObjectsOpenPrintWait
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$Instance::ActivateThread
                                  • API String ID: 2012717400-3316880570
                                  • Opcode ID: 920478a2febea63be234af5d735885e5b2f08a470a5a79d564a35f439bdcfa98
                                  • Instruction ID: c5875c4df6496cccfb40bb4ae32e85a1c004a8f5064e731dc96e1a4a56afb868
                                  • Opcode Fuzzy Hash: 920478a2febea63be234af5d735885e5b2f08a470a5a79d564a35f439bdcfa98
                                  • Instruction Fuzzy Hash: DE312071A61711BBE7202BA8AD0DFFB376CAB45B51F11412AF901E21D2DA74CC2196B2
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000208,Dwz ERROR: %s:%d - hr = 0x%08X,00000000,00000001), ref: 002B515D
                                  • HeapAlloc.KERNEL32(00000000), ref: 002B5164
                                  • GetProcessHeap.KERNEL32(00000000,00000208), ref: 002B5188
                                  • HeapAlloc.KERNEL32(00000000), ref: 002B518F
                                  • LocalFree.KERNEL32(00000000), ref: 002B5280
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B5291
                                  • HeapFree.KERNEL32(00000000), ref: 002B5298
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B52A5
                                  • HeapFree.KERNEL32(00000000), ref: 002B52AC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free$Alloc$Local
                                  • String ID: CreateTemporarySessionFile$Dwz ERROR: %s:%d - hr = 0x%08X$inuse
                                  • API String ID: 3602341650-4133902860
                                  • Opcode ID: 4ab3b76d1b3f1ab9657fd24763a12a8193c63a922bc3cb95f1e1903e27d15d3d
                                  • Instruction ID: 76f54fa7c176cf8b2ba4610d57f74655f4b015972c7c9b4118691b1299920d3a
                                  • Opcode Fuzzy Hash: 4ab3b76d1b3f1ab9657fd24763a12a8193c63a922bc3cb95f1e1903e27d15d3d
                                  • Instruction Fuzzy Hash: F431DA71E62B317BEB215BA49C4DBDB3B689B44BA1F140126BD15EF1C1DAB08C5087A0
                                  APIs
                                  • __EH_prolog3.LIBCMT ref: 002900FD
                                  • #42.ATL(00000024,00290C9C,?,?,00000000,?,?,?,00290BD3,?), ref: 00290150
                                  • StringFromCLSID.OLE32(00284968,?,?,00000000,?,?,?,00290BD3,?), ref: 00290170
                                  • #40.ATL(?,?,00000000,?,?,00284958,?,?,00000000,?,?,?,00290BD3,?), ref: 002901B1
                                  • GetWindowLongW.USER32(?,000000EC), ref: 002902D4
                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 002902E5
                                  • SysFreeString.OLEAUT32(?), ref: 00290443
                                  • CoTaskMemFree.OLE32(00000000,?,?,?,00000000,?,?,?,00290BD3,?), ref: 00290452
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeLongStringWindow$FromH_prolog3Task
                                  • String ID: BrowserSink::Init$Dwz ERROR: %s:%d - hr = 0x%08X$Dwz IGNORED: %s:%d - hr = 0x%08X$about:blank
                                  • API String ID: 1202341430-4283021174
                                  • Opcode ID: 78ddc1250817bc7fbf9c2f0374b3c3116ae0710420413cd64bc2d12206e7b585
                                  • Instruction ID: 3301daed221011785aac524e03ae92a1d18b851e2beb5ba4f02762d5b9028070
                                  • Opcode Fuzzy Hash: 78ddc1250817bc7fbf9c2f0374b3c3116ae0710420413cd64bc2d12206e7b585
                                  • Instruction Fuzzy Hash: 78C1AE75A20219AFDF01DB54DC89EAE3BB9EF89710F214059E509EB390DB71AD11CB90
                                  APIs
                                    • Part of subcall function 002B8210: WaitForMultipleObjects.KERNEL32(00000002,?,00000000,?,00000000,?,?,?,?,002B801F,000000FF), ref: 002B8233
                                  • GetProcessHeap.KERNEL32(00000000,00001000,000000FF), ref: 002B804A
                                  • HeapAlloc.KERNEL32(00000000), ref: 002B8051
                                    • Part of subcall function 002BC05B: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,002B8077), ref: 002BC201
                                    • Part of subcall function 002BC05B: HeapFree.KERNEL32(00000000,?,?,?,?,002B8077), ref: 002BC208
                                    • Part of subcall function 002BC05B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,002B8077), ref: 002BC215
                                    • Part of subcall function 002BC05B: HeapFree.KERNEL32(00000000,?,?,?,?,002B8077), ref: 002BC21C
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B81DD
                                  • HeapFree.KERNEL32(00000000), ref: 002B81E4
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B81F3
                                  • HeapFree.KERNEL32(00000000), ref: 002B81FA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free$AllocMultipleObjectsWait
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$ServerElevationPipe::Communicate
                                  • API String ID: 3381106598-790325827
                                  • Opcode ID: 0d4a32ad700394e5cd34737f5dcbd4f6470bfb97a6bcab48122357103524482d
                                  • Instruction ID: d8281c71492ab74b1b2ad2f0a072eddf3a1c0b7aac867f166f22ed7a9a90b496
                                  • Opcode Fuzzy Hash: 0d4a32ad700394e5cd34737f5dcbd4f6470bfb97a6bcab48122357103524482d
                                  • Instruction Fuzzy Hash: 06513A32E62221A7DB216FA88C49BEF7A6CAF40790F150515FD0DAB281DE70CC21CBD0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000800,00000000,00000001,?,?,002B7076,resultreport.xml,?,002B26E2), ref: 002B70DE
                                  • HeapAlloc.KERNEL32(00000000,?,?,002B7076,resultreport.xml,?,002B26E2), ref: 002B70E5
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00000001), ref: 002B71E6
                                  • HeapFree.KERNEL32(00000000,?,00000001), ref: 002B71ED
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFreePrint
                                  • String ID: %s\..\$CopyLatestCab$Dwz ERROR: %s:%d - hr = 0x%08X$latest.cab
                                  • API String ID: 1330678134-1717097095
                                  • Opcode ID: e1f3858b8b5c9a31305c8f2846e67604120333bbd5c12cc0bee84d84451373ef
                                  • Instruction ID: 451abdb714734fb570f8636bc6f11071ca00a89aa441756fe7cf66db7028ba45
                                  • Opcode Fuzzy Hash: e1f3858b8b5c9a31305c8f2846e67604120333bbd5c12cc0bee84d84451373ef
                                  • Instruction Fuzzy Hash: 8F210E71BB631077EB2177D85D0EFEB2E159B95B61F140005F509762C2D9E18D6086F1
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000800,?,002B9658), ref: 002B9A5D
                                  • HeapAlloc.KERNEL32(00000000,?,002B9658), ref: 002B9A64
                                  • SysFreeString.OLEAUT32(00000000), ref: 002B9AEF
                                  • SysFreeString.OLEAUT32(00000000), ref: 002B9B02
                                  • SysFreeString.OLEAUT32(00000000), ref: 002B9B15
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B9B26
                                  • HeapFree.KERNEL32(00000000), ref: 002B9B2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeHeap$String$Process$Alloc
                                  • String ID: %s.%s.%s$Dwz ERROR: %s:%d - hr = 0x%08X$DwzSqmID$Unknown
                                  • API String ID: 1648245399-236281705
                                  • Opcode ID: f6a73c7806d53a232d03ed779223a591cd49572187c56aac3dffef992997156e
                                  • Instruction ID: e924c4f637b24d31628936ed50e4f4b80e07e784196bc90a3e2ea8567d874285
                                  • Opcode Fuzzy Hash: f6a73c7806d53a232d03ed779223a591cd49572187c56aac3dffef992997156e
                                  • Instruction Fuzzy Hash: 5E51D171E20206ABDF019FA4DC48BEE77B5EB88360F24405EE605A7280DBB09E51CF91
                                  APIs
                                  • SysFreeString.OLEAUT32(00000000), ref: 002C3989
                                  • GetUserPreferredUILanguages.KERNEL32(00000008,?,00000000,1*,,00000000,?,00000000,?,?,002C2A31), ref: 002C399C
                                  • GetLastError.KERNEL32(?,?,002C2A31,?,?,?,?,?,?,?,?,?,?,?,002C2CE0,?), ref: 002C39A6
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,002C2A31), ref: 002C39DC
                                  • HeapAlloc.KERNEL32(00000000,?,?,002C2A31,?,?,?,?,?,?,?,?,?,?,?,002C2CE0), ref: 002C39E3
                                  • GetUserPreferredUILanguages.KERNEL32(00000008,?,00000000,1*,,?,?,002C2A31), ref: 002C3A06
                                  • GetLastError.KERNEL32(?,?,002C2A31,?,?,?,?,?,?,?,?,?,?,?,002C2CE0,?), ref: 002C3A14
                                  • SysAllocString.OLEAUT32(00000000), ref: 002C3A2E
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,?,002C2A31), ref: 002C3A42
                                  • HeapFree.KERNEL32(00000000,?,?,002C2A31,?,?,?,?,?,?,?,?,?,?,?,002C2CE0), ref: 002C3A49
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$AllocErrorFreeLanguagesLastPreferredProcessStringUser
                                  • String ID: 1*,
                                  • API String ID: 3339195270-2270951038
                                  • Opcode ID: da6587d5bbfdcbfae99d7df1256929e76f40998d12849a680c02db6e960d4fdd
                                  • Instruction ID: 14d4146b1cbb5a93d39dc18cf0380fcfa62fd847c17dcbcbc065176f574163d1
                                  • Opcode Fuzzy Hash: da6587d5bbfdcbfae99d7df1256929e76f40998d12849a680c02db6e960d4fdd
                                  • Instruction Fuzzy Hash: 4A21AB76D11225ABD7219FA8AC4CFAEB7BCBF44711F11866AED45E7210D770CE108BA0
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,00000000,?,00000000,?,002CB008), ref: 002CB077
                                  • GetProcessHeap.KERNEL32(00000000,00000800,?,002CB008), ref: 002CB08E
                                  • HeapAlloc.KERNEL32(00000000,?,002CB008), ref: 002CB095
                                  • LoadStringW.USER32(00000000,?,00000000,00000400), ref: 002CB0B7
                                  • GetLastError.KERNEL32(?,002CB008), ref: 002CB0E9
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,002CB008), ref: 002CB11A
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,002CB008), ref: 002CB127
                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,002CB008), ref: 002CB12E
                                  Strings
                                  • Met ERROR: %s:%d - hr = 0x%08X, xrefs: 002CB106
                                  • MetLoadResourceString, xrefs: 002CB101
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreeLibraryLoadProcess$AllocErrorLastString
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$MetLoadResourceString
                                  • API String ID: 1841400505-1195407799
                                  • Opcode ID: 9aa6c7c6e3e48b79c903293e9c215313f531096eec94d269e52f6839d32c228a
                                  • Instruction ID: 0e113eb1c36868a963c9d33b5ad13e364a26aa804c3851ff05fe5d0e7d5de551
                                  • Opcode Fuzzy Hash: 9aa6c7c6e3e48b79c903293e9c215313f531096eec94d269e52f6839d32c228a
                                  • Instruction Fuzzy Hash: 2A214976B613117BE7220BA96C4FF273A6CDB81B21F14431DF909E7190DBB58C1046A0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000800), ref: 002AC18B
                                  • HeapAlloc.KERNEL32(00000000), ref: 002AC192
                                    • Part of subcall function 0029AA5F: VariantInit.OLEAUT32(00000000), ref: 0029AA76
                                    • Part of subcall function 0029AA5F: SysAllocString.OLEAUT32(00000000), ref: 0029AA7D
                                    • Part of subcall function 0029AA5F: SysFreeString.OLEAUT32(00000000), ref: 0029ABD8
                                    • Part of subcall function 0029AA5F: VariantClear.OLEAUT32(?), ref: 0029ABE2
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 002AC3BA
                                  • HeapFree.KERNEL32(00000000), ref: 002AC3C1
                                  • SysFreeString.OLEAUT32(00000000), ref: 002AC42E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreeString$AllocProcessVariant$ClearInit
                                  • String ID: <Answers />$Answers::LoadSupportAnswers$Dwz ERROR: %s:%d - hr = 0x%08X$Interaction$Value
                                  • API String ID: 602084844-4109931451
                                  • Opcode ID: c2b0819ed45cba0ba2c2951790a8bb45d4bed76c39ace4a7a410b9182093fbbb
                                  • Instruction ID: 94218352b9ada2896f21523a74e6836d6a4ce004a504000e42134b0cd0e2ffee
                                  • Opcode Fuzzy Hash: c2b0819ed45cba0ba2c2951790a8bb45d4bed76c39ace4a7a410b9182093fbbb
                                  • Instruction Fuzzy Hash: 50A1AB756253019BDB009F28D848A2FBBE5ABCAB10F24446DF849E7391DE70EC15CB92
                                  APIs
                                  • memset.MSVCRT ref: 002B88E1
                                  • WinSqmAddToStreamEx.NTDLL(00000000,000019E3,00000007,?,00000000), ref: 002B8A62
                                  • SysFreeString.OLEAUT32(00000000), ref: 002B8B42
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 002B8B53
                                  • HeapFree.KERNEL32(00000000), ref: 002B8B5A
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 002B8B6D
                                  • HeapFree.KERNEL32(00000000), ref: 002B8B74
                                    • Part of subcall function 002B9961: GetProcessHeap.KERNEL32(00000000,00000800,?,002B9658), ref: 002B9A5D
                                    • Part of subcall function 002B9961: HeapAlloc.KERNEL32(00000000,?,002B9658), ref: 002B9A64
                                    • Part of subcall function 002B9961: SysFreeString.OLEAUT32(00000000), ref: 002B9AEF
                                    • Part of subcall function 002B9961: SysFreeString.OLEAUT32(00000000), ref: 002B9B02
                                    • Part of subcall function 002B9961: SysFreeString.OLEAUT32(00000000), ref: 002B9B15
                                    • Part of subcall function 002B9961: GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B9B26
                                    • Part of subcall function 002B9961: HeapFree.KERNEL32(00000000), ref: 002B9B2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Free$ProcessString$AllocStreammemset
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$DwzSqmRootCause
                                  • API String ID: 1426477288-3767431854
                                  • Opcode ID: 6131d33f37b378a121a6b5c38f4907f383deca1a6d1e155d786487a76e2efed6
                                  • Instruction ID: b788d5d551a7d6386274d3a50fb05908a01337eeb2b9ff09123d037719d52713
                                  • Opcode Fuzzy Hash: 6131d33f37b378a121a6b5c38f4907f383deca1a6d1e155d786487a76e2efed6
                                  • Instruction Fuzzy Hash: A89117B5E102189BDB20DF64DC45BEEBBB8BB48714F1040AAE50DE7282DB709E95CF51
                                  APIs
                                  • HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000), ref: 0028F191
                                  • CoInitializeEx.OLE32(00000000,00000002), ref: 0028F22C
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0028F3A9
                                  • GetExitCodeProcess.KERNEL32(?), ref: 0028F3C0
                                    • Part of subcall function 0028F441: EventWriteTransfer.ADVAPI32(002D5000,00000000,00284DD0,00000000,00000000,00000001,002A2BF5,?,00000000,00000000,?,002A2BF5,00000001,00000001,00000000), ref: 0028F47C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: CodeEventExitHeapInformationInitializeObjectProcessSingleTransferWaitWrite
                                  • String ID: Configuration::Destroy$Dwz ERROR: %s:%d - hr = 0x%08X$EnableDiagnostics$Software\Policies\Microsoft\Windows\ScriptedDiagnostics$wWinMain
                                  • API String ID: 3756251323-4070909150
                                  • Opcode ID: 0e7a3e3fca281c3fc233d8a743ea6eb0afdd2bf557a7564c9f74570dee2f273e
                                  • Instruction ID: 93a1d965b4b89ac3e9c6846244b10accad8fbba06996a890bf977122c982c94e
                                  • Opcode Fuzzy Hash: 0e7a3e3fca281c3fc233d8a743ea6eb0afdd2bf557a7564c9f74570dee2f273e
                                  • Instruction Fuzzy Hash: 6E61B57AE336669BDB51BB64ED09A6F77A9AF44710B140136FC05E73C1EB709C208B90
                                  APIs
                                  • SafeArrayAccessData.OLEAUT32(002ADD64,?), ref: 002B00D5
                                  • GetProcessHeap.KERNEL32(00000000,00000014,?,?,?,?,002AFC06,?,002AFF8B,?,?,002AFF8B,?,002ADD64), ref: 002B0103
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,002AFC06,?,002AFF8B,?,?,002AFF8B,?,002ADD64,?,?,?,?), ref: 002B010A
                                  • GetProcessHeap.KERNEL32(00000000,08708B51,?,?,?,002AFC06,?,002AFF8B,?,?,002AFF8B,?,002ADD64), ref: 002B0156
                                  • HeapFree.KERNEL32(00000000,?,?,?,002AFC06,?,002AFF8B,?,?,002AFF8B,?,002ADD64,?,?,?,?), ref: 002B015D
                                  • SafeArrayUnaccessData.OLEAUT32(002ADD64), ref: 002B0170
                                  • SafeArrayDestroy.OLEAUT32(002ADD64), ref: 002B017E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$ArraySafe$DataProcess$AccessAllocDestroyFreeUnaccess
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$Provider::GetPublisherCertificateDigest
                                  • API String ID: 2725635877-3664017035
                                  • Opcode ID: 6bab28a5982c9af7f4d49c09ba586aae8759ea3957e88c40c8af9605b4475367
                                  • Instruction ID: 2dcba02fc8e28c51565db3c5a991e9d3a40cc7aa42bd8bbce8387afa41461d96
                                  • Opcode Fuzzy Hash: 6bab28a5982c9af7f4d49c09ba586aae8759ea3957e88c40c8af9605b4475367
                                  • Instruction Fuzzy Hash: 7E310775A61210FFDB26AF99DC8DEDB3B78EB09790F104059F509A7292C670CD50CBA0
                                  APIs
                                    • Part of subcall function 002B566F: GetCurrentThread.KERNEL32 ref: 002B5688
                                    • Part of subcall function 002B566F: OpenThreadToken.ADVAPI32(00000000,?,002B5824,00000000,00000000,?,D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),?,002B5926,00000000,00000000,00000000), ref: 002B568F
                                    • Part of subcall function 002B566F: GetLastError.KERNEL32(?,002B5824,00000000,00000000,?,D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),?,002B5926,00000000,00000000,00000000), ref: 002B5699
                                    • Part of subcall function 002B566F: CloseHandle.KERNEL32(00000000,002B5926,00000000,00000000), ref: 002B57FA
                                  • GetProcessHeap.KERNEL32(00000000,00000800,00000000,00000000,?,D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),?,002B5926,00000000,00000000,00000000), ref: 002B5839
                                  • HeapAlloc.KERNEL32(00000000,?,002B5926,00000000,00000000,00000000), ref: 002B5840
                                  • LocalFree.KERNEL32(00000000), ref: 002B58B3
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B58C0
                                  • HeapFree.KERNEL32(00000000), ref: 002B58C7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcessThread$AllocCloseCurrentErrorHandleLastLocalOpenToken
                                  • String ID: D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA)$Dwz ERROR: %s:%d - hr = 0x%08X$InsertCurrentUserSid
                                  • API String ID: 1580427788-1940817153
                                  • Opcode ID: caab69c74edcc76344efa50fc4014b0f09fda2365ffab4052f007cb10830405d
                                  • Instruction ID: c3df26f3796fe05058d980e014523e56152900c83a314c386e166bd307463c88
                                  • Opcode Fuzzy Hash: caab69c74edcc76344efa50fc4014b0f09fda2365ffab4052f007cb10830405d
                                  • Instruction Fuzzy Hash: DD112C31E61724BBF7212794AC0EFEA376DDB40BA5F100169F505BF1C1DAF48D9086A1
                                  APIs
                                    • Part of subcall function 002C6F2A: GetCurrentThread.KERNEL32 ref: 002C6F43
                                    • Part of subcall function 002C6F2A: OpenThreadToken.ADVAPI32(00000000,?,002C70DF,00000000,00000000,?,D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),?,002C71E1,00000000,00000000,?,?,?), ref: 002C6F4A
                                    • Part of subcall function 002C6F2A: GetLastError.KERNEL32(?,002C70DF,00000000,00000000,?,D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),?,002C71E1,00000000,00000000,?,?,?), ref: 002C6F54
                                    • Part of subcall function 002C6F2A: CloseHandle.KERNEL32(00000000,?,?,?), ref: 002C70B5
                                  • GetProcessHeap.KERNEL32(00000000,00000800,00000000,00000000,?,D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA),?,002C71E1,00000000,00000000,?,?,?), ref: 002C70F4
                                  • HeapAlloc.KERNEL32(00000000,?,002C71E1,00000000,00000000,?,?,?), ref: 002C70FB
                                  • LocalFree.KERNEL32(00000000), ref: 002C716E
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002C717B
                                  • HeapFree.KERNEL32(00000000), ref: 002C7182
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcessThread$AllocCloseCurrentErrorHandleLastLocalOpenToken
                                  • String ID: D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA)$Met ERROR: %s:%d - hr = 0x%08X$MetInsertCurrentUserSid
                                  • API String ID: 1580427788-1269016989
                                  • Opcode ID: ea0b63fc039fa8bf9c90ea94800b133b90ece70f660af0c2422c7fdc1c41feb9
                                  • Instruction ID: 269b49c47a23d09a1d0751ef67e54bb9ec4a31ca92813c9b84a72f198e3784ef
                                  • Opcode Fuzzy Hash: ea0b63fc039fa8bf9c90ea94800b133b90ece70f660af0c2422c7fdc1c41feb9
                                  • Instruction Fuzzy Hash: 33112971A65305BBEB221B94AC0EFBE3768DB41B65F14025DF509B72D0DAF49D108BA0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00001000,00000000,00000000,?,?,?,?,002B8077), ref: 002BC096
                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,002B8077), ref: 002BC09D
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,002B8077), ref: 002BC201
                                  • HeapFree.KERNEL32(00000000,?,?,?,?,002B8077), ref: 002BC208
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,002B8077), ref: 002BC215
                                  • HeapFree.KERNEL32(00000000,?,?,?,?,002B8077), ref: 002BC21C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$Free$Alloc
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$Packages_GetResolutionsRun
                                  • API String ID: 3689955550-3408643145
                                  • Opcode ID: 7992f5795069ef811abeb755ed3edeadd557341ad3068c69f3e0359c190460bc
                                  • Instruction ID: ea71daf9e71b5d00ca757a7b6269bfe60935e121580769aaba6d10e519ed8655
                                  • Opcode Fuzzy Hash: 7992f5795069ef811abeb755ed3edeadd557341ad3068c69f3e0359c190460bc
                                  • Instruction Fuzzy Hash: 1151C471E61306ABEF009FA9C849FAE77B5AF44751F20006DF504F7282DBB48D508BA0
                                  APIs
                                  • SysAllocString.OLEAUT32(Value), ref: 002AB9BD
                                  • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 002ABA1B
                                  • SysFreeString.OLEAUT32(00000000), ref: 002ABA78
                                  • SysFreeString.OLEAUT32(?), ref: 002ABAF7
                                  • SysFreeString.OLEAUT32(00000000), ref: 002ABB06
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$Free$AllocArrayElementSafe
                                  • String ID: Answers::SetValuesInXML$Dwz ERROR: %s:%d - hr = 0x%08X$Value
                                  • API String ID: 2068732172-3905522104
                                  • Opcode ID: 9b27406e6f3c03e03089131e7757898fcc149edda963d74a24d09d509512b306
                                  • Instruction ID: 8e528ea634d4c55b30758f05c17c10917c68d8084a789a7e0b3b81fe75543988
                                  • Opcode Fuzzy Hash: 9b27406e6f3c03e03089131e7757898fcc149edda963d74a24d09d509512b306
                                  • Instruction Fuzzy Hash: 4A51E135A20205EBCB11DF94DC09F5E7BB4EB8A710F10005AE501E7292DFB19E60DB90
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 002C80F0
                                  • SysFreeString.OLEAUT32(?), ref: 002C8131
                                  • GetProcessHeap.KERNEL32(00000000,?,00000000,00000000,00000000,?,?,00000000,?,?), ref: 002C81BE
                                  • HeapFree.KERNEL32(00000000), ref: 002C81C5
                                  • SysFreeString.OLEAUT32(?), ref: 002C81DF
                                  • SysFreeString.OLEAUT32(00000000), ref: 002C81F1
                                  Strings
                                  • Met ERROR: %s:%d - hr = 0x%08X, xrefs: 002C8241
                                  • Package::MergeRootCauses, xrefs: 002C823C
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Free$String$Heap$Process
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$Package::MergeRootCauses
                                  • API String ID: 1137075025-3551198637
                                  • Opcode ID: a35698c5ab276f68ec431955e39952156e668e4baba19028da189ddee2188e5a
                                  • Instruction ID: 37d0f9a28827ab9834b2f238d08a7635325cd915d850d0dc24918c0c4c728aaa
                                  • Opcode Fuzzy Hash: a35698c5ab276f68ec431955e39952156e668e4baba19028da189ddee2188e5a
                                  • Instruction Fuzzy Hash: CC517C75E20215ABDF10DF94D848EAEB7B8BF48720F198199E845E7341DB70EE52CB90
                                  APIs
                                  • ?Click@Button@DirectUI@@SG?AVUID@@XZ.DUI70(?), ref: 002B2051
                                    • Part of subcall function 00291AFB: ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00291B23
                                    • Part of subcall function 00291AFB: SysFreeString.OLEAUT32(00000000), ref: 00291B52
                                    • Part of subcall function 002B4702: memset.MSVCRT ref: 002B4747
                                    • Part of subcall function 002B4702: GetProcessHeap.KERNEL32(00000000,00000208), ref: 002B47A0
                                    • Part of subcall function 002B4702: HeapAlloc.KERNEL32(00000000), ref: 002B47A7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$AllocButton@Click@DirectExecuteFreeProcessShellStringmemset
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$UploadFilePage::OnListenedEvent$btnAdd$btnView$linkPrivacy$open
                                  • API String ID: 3338875053-627841393
                                  • Opcode ID: ec54a90be35bdc1cfd837670022261737c07fa7255a8d307b9df46ddb1c593bf
                                  • Instruction ID: 16da4fc800334bce135c72e6cb3519105e615b7a11bad9ee31379779cc27a8b4
                                  • Opcode Fuzzy Hash: ec54a90be35bdc1cfd837670022261737c07fa7255a8d307b9df46ddb1c593bf
                                  • Instruction Fuzzy Hash: 0841E7747B0319FAFB20FA55CC86FFB726C9B55780F504445FA19F61C2D6A0ADA88E20
                                  APIs
                                  • WinHttpGetDefaultProxyConfiguration.WINHTTP(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,002C31E0,?), ref: 002C383C
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,002C31E0,?,?,?,?,00000000), ref: 002C3849
                                  • WinHttpGetIEProxyConfigForCurrentUser.WINHTTP(?,?,?,?,?,?,?,?,?,?,?,002C31E0,?), ref: 002C3877
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,002C31E0,?,?,?,?,00000000), ref: 002C3881
                                  • WinHttpGetProxyForUrl.WINHTTP(1,,?,?,?), ref: 002C38F6
                                  • GetLastError.KERNEL32 ref: 002C3900
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: ErrorHttpLastProxy$ConfigConfigurationCurrentDefaultUser
                                  • String ID: 1,$1,
                                  • API String ID: 2667053462-307060232
                                  • Opcode ID: e2676e95b834acf9f9cc59d49e87c42b68c5cb3f78c0f72c806bba8af7c437ed
                                  • Instruction ID: e99e446ed3a58516ab80e954cc47bfee3cf05990365125a57928d7dd396f6dcf
                                  • Opcode Fuzzy Hash: e2676e95b834acf9f9cc59d49e87c42b68c5cb3f78c0f72c806bba8af7c437ed
                                  • Instruction Fuzzy Hash: B031A171B102269BEB10DFB5D948BAEBBB9BF44304F008A2AE901D6250E775DA14C7A0
                                  APIs
                                    • Part of subcall function 002B5596: GetProcessHeap.KERNEL32(00000000,00000044,00000000,00000000,00000000,00000000,?,002B52CF,00000000,00000000,00000000,?,002B5471), ref: 002B55AA
                                    • Part of subcall function 002B5596: HeapAlloc.KERNEL32(00000000,?,002B52CF,00000000,00000000,00000000,?,002B5471), ref: 002B55B1
                                  • SysFreeString.OLEAUT32(?), ref: 002B598D
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000001,?,00000000), ref: 002B5972
                                  • GetLastError.KERNEL32(?,002B5A40), ref: 002B599A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: DescriptorHeapSecurityString$AllocConvertErrorFreeLastPrintProcess
                                  • String ID: CreateSddl$CreateSecurityDescriptor$D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA)$D:(A;OICI;GA;;;SY)(A;OICI;GA;;;BA)(A;OICI;GA;;;%s)$Dwz ERROR: %s:%d - hr = 0x%08X
                                  • API String ID: 3452556777-2640182595
                                  • Opcode ID: 5a9473054e79804ddd45f25068fb7f2245b90422835f419c4fb359391989f0f7
                                  • Instruction ID: 4ba55a325ef53d2832f59ea80872cba5fd438014fbc2d67827aca1f579e34cbe
                                  • Opcode Fuzzy Hash: 5a9473054e79804ddd45f25068fb7f2245b90422835f419c4fb359391989f0f7
                                  • Instruction Fuzzy Hash: F2213D72A71F31F7E72177859C46FEB6A589B40BB0F090115F904BE1C2D6918D6086E0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000208,00000000,?,-00000008,?,?,002ACF44), ref: 002AE0CD
                                  • HeapAlloc.KERNEL32(00000000,?,?,002ACF44), ref: 002AE0D4
                                  • GetFullPathNameW.KERNEL32(?,00000103,00000000,00000000,?,?,002ACF44), ref: 002AE10A
                                  • GetLastError.KERNEL32(?,00000103,00000000,00000000,?,?,002ACF44), ref: 002AE114
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00000103,00000000,00000000,?,?,002ACF44), ref: 002AE16B
                                  • HeapFree.KERNEL32(00000000,?,00000103,00000000,00000000,?,?,002ACF44), ref: 002AE172
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocErrorFreeFullLastNamePathPrint
                                  • String ID: Configuration::CanonicalizeFilePath$Dwz ERROR: %s:%d - hr = 0x%08X
                                  • API String ID: 458122546-164970263
                                  • Opcode ID: 9aaa0a68d434be7978318f7ec09fc55aebf502ab2a5ff3cd5ffa4cc83d7dbda8
                                  • Instruction ID: 67537e46f3429e7c5a5c23730ac1d2b1b38ede09508c5f6a900b921cfaad7498
                                  • Opcode Fuzzy Hash: 9aaa0a68d434be7978318f7ec09fc55aebf502ab2a5ff3cd5ffa4cc83d7dbda8
                                  • Instruction Fuzzy Hash: E411B676FA133167EB3027D55C0EF973A6C9B86B62F120115B919A6282DDB18C1146A1
                                  APIs
                                  • SysAllocString.OLEAUT32(Run), ref: 002A9039
                                  • SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 002A906E
                                  • SafeArrayPutElement.OLEAUT32(00000000,?,00000000), ref: 002A90A3
                                  • SysFreeString.OLEAUT32(00000000), ref: 002A90BD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: ArraySafeString$AllocCreateElementFree
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$InteractivityUIPage::GetUserChoices$NotRun$Run
                                  • API String ID: 3180618122-1293613164
                                  • Opcode ID: 352153cfd669d014fd56fc7d3e3a318b73dacd8f58d1b492f526033065497563
                                  • Instruction ID: 0b26bb92d9700fde22fa8c4e8f19daf1697e0adf441c86148f96ae9bfe0cb0e5
                                  • Opcode Fuzzy Hash: 352153cfd669d014fd56fc7d3e3a318b73dacd8f58d1b492f526033065497563
                                  • Instruction Fuzzy Hash: 89112BF5A61305BBE7107FED5C89DAB7AACDB16754F10407AFA01E7281E9B0CC904760
                                  APIs
                                  • ExpandEnvironmentStringsW.KERNEL32(%windir%\system32\sdiagprv.dll,?,00000104,00000000,?), ref: 002AF916
                                  • LoadLibraryW.KERNEL32(?), ref: 002AF929
                                  • GetLastError.KERNEL32 ref: 002AF941
                                  • GetProcAddress.KERNEL32(00000000,DllGetClassObject), ref: 002AF979
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: AddressEnvironmentErrorExpandLastLibraryLoadProcStrings
                                  • String ID: %windir%\system32\sdiagprv.dll$DllGetClassObject$Dwz ERROR: %s:%d - hr = 0x%08X$Provider::Init
                                  • API String ID: 3858636646-3241566972
                                  • Opcode ID: d511050444a74b3f53a0a8d26886e6eaf51517d340d1802f7f3ba85db41b45fe
                                  • Instruction ID: f1a73aaee5e0fd7a7edaf436832f024aa0b2b713e328a3dfdb5dcd3137bd0117
                                  • Opcode Fuzzy Hash: d511050444a74b3f53a0a8d26886e6eaf51517d340d1802f7f3ba85db41b45fe
                                  • Instruction Fuzzy Hash: 6411E6B5A66323BBE7609BA49D09B6BB7989B06710F104136AD08E72C1DE74CC208B90
                                  APIs
                                  • memset.MSVCRT ref: 002B410C
                                  • ShellExecuteExW.SHELL32(00000000), ref: 002B413D
                                  • GetLastError.KERNEL32(?,00000001,00000000,00000000), ref: 002B4147
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: ErrorExecuteLastShellmemset
                                  • String ID: /name Microsoft.Troubleshooting /page settingPage$Dwz ERROR: %s:%d - hr = 0x%08X$LaunchSettingsInCPL$control.exe$open
                                  • API String ID: 486181658-55902566
                                  • Opcode ID: 90dc6372dc50051bdfec90078b70bf54d85e6d21eee36020ae6911392646b995
                                  • Instruction ID: a09899250f4e9db1a61901c22e770426e4ebcb32d41b028d63bea094aac08142
                                  • Opcode Fuzzy Hash: 90dc6372dc50051bdfec90078b70bf54d85e6d21eee36020ae6911392646b995
                                  • Instruction Fuzzy Hash: 520152B6D612246BDB207BAAAC499DFBEBCAB94754F000016ED15F6251D77088548AA0
                                  APIs
                                  Strings
                                  • Configuration::CheckNumberArgs, xrefs: 002AD254
                                  • ms-msdt:, xrefs: 002AD19D, 002AD222
                                  • mshelp://windows/?id=a2f80104-cb3a-4b9c-901f-733f4a882248, xrefs: 002AD1E0
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002AD259
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: _wcsicmp_wcsnicmp
                                  • String ID: Configuration::CheckNumberArgs$Dwz ERROR: %s:%d - hr = 0x%08X$ms-msdt:$mshelp://windows/?id=a2f80104-cb3a-4b9c-901f-733f4a882248
                                  • API String ID: 2406916947-3846346942
                                  • Opcode ID: fd0ca99d28de43f69638d01ab5d90b1c18127ca1529211252fa4f1b4ca56cc6c
                                  • Instruction ID: ce49ef0966b53aca31516ecedfc109695c48e931ed4b022301d1c31efa7c83ed
                                  • Opcode Fuzzy Hash: fd0ca99d28de43f69638d01ab5d90b1c18127ca1529211252fa4f1b4ca56cc6c
                                  • Instruction Fuzzy Hash: 43215A72AB43026BEB106F588C89FAAB764DB23314F544025ED4AA75C3DFB1DC61C351
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000800,00000000,00000000,?,002C2729,?,00000001), ref: 002C217F
                                  • HeapAlloc.KERNEL32(00000000), ref: 002C2186
                                  • RegLoadMUIStringW.ADVAPI32(00000000,DisplayName,00000000,00000000,00000000,00000001,00000000), ref: 002C21AD
                                  • RegQueryValueExW.ADVAPI32(00000000,DisplayName,00000000,?,00000000,?), ref: 002C21DA
                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 002C2204
                                  • HeapFree.KERNEL32(00000000), ref: 002C220B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFreeLoadQueryStringValue
                                  • String ID: DisplayName
                                  • API String ID: 1336039828-3786665039
                                  • Opcode ID: 4cd6849a15c3c7fa24354f2820e4b67994593c513f0263fecacb5488773f3779
                                  • Instruction ID: 5ce624b4bbaad454e2f653e84a262e639729a9cf0fb13f7dee62a7e2ff990881
                                  • Opcode Fuzzy Hash: 4cd6849a15c3c7fa24354f2820e4b67994593c513f0263fecacb5488773f3779
                                  • Instruction Fuzzy Hash: 7F11E477D11225FBDB209BA89C0CFAB776CEB44761F15412AFE05E7241DAB48D0497E0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,00000000,00000000,00000000,00000000,00000000,?,00000000,?,002AB228,00000000,00000000,00000000,00000000,00000000,?), ref: 002AB8EF
                                  • HeapAlloc.KERNEL32(00000000,?,002AB228,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,002AB645,00000000,00000000), ref: 002AB8F6
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000), ref: 002AB959
                                  • HeapFree.KERNEL32(00000000), ref: 002AB960
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFree
                                  • String ID: /Packages/Package[@ID='%s']/Interaction[@ID='%s']$Answers::GetInteractionXPath$Default$Dwz ERROR: %s:%d - hr = 0x%08X
                                  • API String ID: 756756679-3715230758
                                  • Opcode ID: 3af9d86ca6f71bb65c6a116a83d45a9d8fed46ea9c1a89471d3e7eafad7548c7
                                  • Instruction ID: dcaae55120e98bc434fc0cc892d620de9f28d479fa8efd64ea965a3a241d67b1
                                  • Opcode Fuzzy Hash: 3af9d86ca6f71bb65c6a116a83d45a9d8fed46ea9c1a89471d3e7eafad7548c7
                                  • Instruction Fuzzy Hash: 7031E732E61315BBDB12AAE98C49B9B265C9F12720F210065F905E7283DFB4DD20D7A0
                                  APIs
                                  • memset.MSVCRT ref: 002B915C
                                  • WinSqmAddToStreamEx.NTDLL(00000000,000018E6,0000000B,?,00000000), ref: 002B944C
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 002B953C
                                  • HeapFree.KERNEL32(00000000), ref: 002B9543
                                    • Part of subcall function 002B9961: GetProcessHeap.KERNEL32(00000000,00000800,?,002B9658), ref: 002B9A5D
                                    • Part of subcall function 002B9961: HeapAlloc.KERNEL32(00000000,?,002B9658), ref: 002B9A64
                                    • Part of subcall function 002B9961: SysFreeString.OLEAUT32(00000000), ref: 002B9AEF
                                    • Part of subcall function 002B9961: SysFreeString.OLEAUT32(00000000), ref: 002B9B02
                                    • Part of subcall function 002B9961: SysFreeString.OLEAUT32(00000000), ref: 002B9B15
                                    • Part of subcall function 002B9961: GetProcessHeap.KERNEL32(00000000,00000000), ref: 002B9B26
                                    • Part of subcall function 002B9961: HeapFree.KERNEL32(00000000), ref: 002B9B2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Free$ProcessString$AllocPrintStreammemset
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$DwzSqmExit
                                  • API String ID: 1412277093-4067980934
                                  • Opcode ID: e2a69b85ead81ffde160060f86349ac5934925e0ba2acdc121302d945f1a0004
                                  • Instruction ID: 9a531aea74d0e1410c777c4be0d34927a0d34541fae7ecf207ac0dfc8452399e
                                  • Opcode Fuzzy Hash: e2a69b85ead81ffde160060f86349ac5934925e0ba2acdc121302d945f1a0004
                                  • Instruction Fuzzy Hash: D2C15A70A183019FD350DF64C885B9BBBE4BF88344F10492EFA8997381EBB1D9958F52
                                  APIs
                                  • VariantInit.OLEAUT32(?), ref: 0029A174
                                  • CoCreateInstance.OLE32(002848E8,00000000,00000015,002848A8,00000000,?,?,?,?,?,002AE70D,00000000), ref: 0029A1C7
                                  • SysAllocString.OLEAUT32 ref: 0029A202
                                  • VariantClear.OLEAUT32(?), ref: 0029A290
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Variant$AllocClearCreateInitInstanceString
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$DwzXmlLoad
                                  • API String ID: 3126708813-134523199
                                  • Opcode ID: d5807a37abb04173c282737e4e1a3c15b3aa936a923b842c97f42a8072fe88c9
                                  • Instruction ID: bdc6ce2a8eed212c5235c5901166ca0afa1baec3e7d262cf7571dafd52f9d557
                                  • Opcode Fuzzy Hash: d5807a37abb04173c282737e4e1a3c15b3aa936a923b842c97f42a8072fe88c9
                                  • Instruction Fuzzy Hash: BB41D275A60315ABDF10DB98DC4DF6E3BB9EF89720F10005AF906EB290DAB19D418BD1
                                  APIs
                                  • WaitForMultipleObjects.KERNEL32(0000001D,?,00000000,000000FF,00000000,00000000), ref: 002B308D
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,002A1C7E), ref: 002B30AF
                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,002A1C7E), ref: 002B30D2
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,002A1C7E), ref: 002B30DC
                                  Strings
                                  • WaitForProgressPage, xrefs: 002B30FB
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002B3100
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EventMultipleObjectsWait
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$WaitForProgressPage
                                  • API String ID: 4065991757-155574490
                                  • Opcode ID: 8826190f3c69a142bf2c17c7f4de4adfffb97bc415f145dc327d5bc1186d1d32
                                  • Instruction ID: e44fd1b25551db5d9a1d5601c259c4ccd90a1b32b5c282620fd660003f02de3c
                                  • Opcode Fuzzy Hash: 8826190f3c69a142bf2c17c7f4de4adfffb97bc415f145dc327d5bc1186d1d32
                                  • Instruction Fuzzy Hash: 8211E732E71535A7DB30EAAC6C0EBDB7FA8AB017A0F110126FC05F71D1CA518D5096D0
                                  APIs
                                  • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 002A2069
                                  • _wcsicmp.MSVCRT ref: 002A20AB
                                  • SysFreeString.OLEAUT32(00000000), ref: 002A20C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: ArrayElementFreeSafeString_wcsicmp
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$EngineCallback::UploadLater$Later
                                  • API String ID: 3202088984-2789295299
                                  • Opcode ID: 8281aa3874ccb0f12d43487e3d168d6460d06ceb171268695adccaa2835aa045
                                  • Instruction ID: 9e276656981340fe636e99e0712eee10442845ff42b5b89e050208eefb755035
                                  • Opcode Fuzzy Hash: 8281aa3874ccb0f12d43487e3d168d6460d06ceb171268695adccaa2835aa045
                                  • Instruction Fuzzy Hash: 4B11C271A21215FBDB219F98DC09E9F7B68EB62760F10005AF401F3180DBB09E64D7A1
                                  APIs
                                    • Part of subcall function 002A53E0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,002A6F7B), ref: 002A5418
                                    • Part of subcall function 002A53E0: HeapFree.KERNEL32(00000000,?,?,?,002A6F7B), ref: 002A541F
                                    • Part of subcall function 002A53E0: SysFreeString.OLEAUT32(?), ref: 002A5430
                                    • Part of subcall function 002A53E0: SysFreeString.OLEAUT32(?), ref: 002A5441
                                    • Part of subcall function 002A53E0: SysFreeString.OLEAUT32(?), ref: 002A5452
                                    • Part of subcall function 002A53E0: SysFreeString.OLEAUT32(?), ref: 002A5463
                                    • Part of subcall function 002A53E0: SysFreeString.OLEAUT32(?), ref: 002A5474
                                  • SysFreeString.OLEAUT32(?), ref: 002A9122
                                  • SysFreeString.OLEAUT32(?), ref: 002A9133
                                  • SysFreeString.OLEAUT32(?), ref: 002A9144
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Free$String$Heap$Process
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$InteractivityUIPage::ResetUI$txtUIError
                                  • API String ID: 1137075025-1765648997
                                  • Opcode ID: 9036070494b7f192e779102dad130fec5f2b4e196449e50c1e5b5649e59c5a8e
                                  • Instruction ID: ce1b1666678afc8fe212c75f32eccac2403122ffc66eecf0ac8ca13fab251cf4
                                  • Opcode Fuzzy Hash: 9036070494b7f192e779102dad130fec5f2b4e196449e50c1e5b5649e59c5a8e
                                  • Instruction Fuzzy Hash: BF017535661B129BDB316F67DC89857BAA1BB82710F11082EF5C791751DE70E8A0CB50
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,002990CD), ref: 002990FF
                                  • HeapFree.KERNEL32(00000000,?,?,002990CD), ref: 00299106
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,002990CD), ref: 00299118
                                  • HeapFree.KERNEL32(00000000,?,?,002990CD), ref: 0029911F
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,002990CD), ref: 00299131
                                  • HeapFree.KERNEL32(00000000,?,?,002990CD), ref: 00299138
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,002990CD), ref: 0029914A
                                  • HeapFree.KERNEL32(00000000,?,?,002990CD), ref: 00299151
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreeProcess
                                  • String ID:
                                  • API String ID: 3859560861-0
                                  • Opcode ID: e46ae5f589254ab26909d321e8207c7736b0ea6656650f93a671207832d1c7af
                                  • Instruction ID: 1f058d622b2144a6415a1410d25632efd691f8ad3b7874a107cb5ba0fe4bf38f
                                  • Opcode Fuzzy Hash: e46ae5f589254ab26909d321e8207c7736b0ea6656650f93a671207832d1c7af
                                  • Instruction Fuzzy Hash: 4201C075801B11DFCB715F65AD4C46ABBF8FB89B12310092FF29782921C775A891DF50
                                  APIs
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000001,00000000,Dwz ERROR: %s:%d - hr = 0x%08X), ref: 002BCCD0
                                  • HeapFree.KERNEL32(00000000), ref: 002BCCD7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreePrintProcess
                                  • String ID: 1++$Dwz ERROR: %s:%d - hr = 0x%08X$Dwz IGNORED: %s:%d - hr = 0x%08X$Packages_Diagnose
                                  • API String ID: 2870207377-1178351787
                                  • Opcode ID: 84b064a0242f34a323875f1e81d8585611e3ea0ebe9a19bf54138b33656124ef
                                  • Instruction ID: 8f6aa79a232cab66b4dc922b62436bcfb1e76222e4c6761766c460115001a7e6
                                  • Opcode Fuzzy Hash: 84b064a0242f34a323875f1e81d8585611e3ea0ebe9a19bf54138b33656124ef
                                  • Instruction Fuzzy Hash: C7B1D471F2131A9FDB05DFA4C895AEEBBF4AF08755F24406AE406A7291CBB09D51CF80
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000800,00000000,?,00000000), ref: 002C0841
                                  • HeapAlloc.KERNEL32(00000000,?,00000000), ref: 002C0848
                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000), ref: 002C0941
                                  • HeapFree.KERNEL32(00000000,?,00000000), ref: 002C0948
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$RCs_Keywords
                                  • API String ID: 1330678134-3416285057
                                  • Opcode ID: ca9f756f02c88bffb5926d52e484e3cec03cff461cbad716c6921067f1fa3ea0
                                  • Instruction ID: 638e76667869013b075bcffddc2de385dc85ab9121857fc14638272179c881e9
                                  • Opcode Fuzzy Hash: ca9f756f02c88bffb5926d52e484e3cec03cff461cbad716c6921067f1fa3ea0
                                  • Instruction Fuzzy Hash: D8415431B20216E7EB107FA08D86F9F7665AF94B14F00016DE906A7283DB71CD618B90
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,002C1214,00000000,00000000,002BCE8D,00000001,00000000,Dwz ERROR: %s:%d - hr = 0x%08X), ref: 002C112C
                                  • HeapFree.KERNEL32(00000000,?,002C1214,00000000,00000000,002BCE8D,00000001,00000000,Dwz ERROR: %s:%d - hr = 0x%08X,?,?,?,002B2B99), ref: 002C1133
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  • GetProcessHeap.KERNEL32(00000008,?,00000000,00000000,00000000,00000000,00000000,?,002C1214,00000000,00000000,002BCE8D,00000001,00000000,Dwz ERROR: %s:%d - hr = 0x%08X), ref: 002C1144
                                  • HeapAlloc.KERNEL32(00000000,?,002C1214,00000000,00000000,002BCE8D,00000001,00000000,Dwz ERROR: %s:%d - hr = 0x%08X,?,?,?,002B2B99), ref: 002C114B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$Process$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$ResolutionOrderIterator::Reset
                                  • API String ID: 1330678134-513673997
                                  • Opcode ID: 9d32d61db0d5d2c1f7efb98102f6f0b328ca8677cccdf325cad1b0b31d1681a1
                                  • Instruction ID: 3ba8e31bd5b8721a215281218cbe3d42215f641165f51283ffaf69b7055ba9ce
                                  • Opcode Fuzzy Hash: 9d32d61db0d5d2c1f7efb98102f6f0b328ca8677cccdf325cad1b0b31d1681a1
                                  • Instruction Fuzzy Hash: 4B31F871A21220EBDB10AF94CC4AF5E7BB8EF46B11F144159F505DB256CAB09D61CBA0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,000000E0), ref: 0028F90A
                                  • HeapAlloc.KERNEL32(00000000), ref: 0028F911
                                  • ??0CCListView@DirectUI@@QAE@XZ.DUI70 ref: 0028F91F
                                  • ?Initialize@CCListView@DirectUI@@QAEJIPAVElement@2@PAK@Z.DUI70(00000003,?,?), ref: 0028F935
                                  • ?Destroy@Element@DirectUI@@QAEJ_N@Z.DUI70(00000001), ref: 0028F945
                                  • ?SetWinStyle@CCBase@DirectUI@@QAEJH@Z.DUI70(50000008), ref: 0028F952
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Direct$HeapListView@$AllocBase@Destroy@Element@Element@2@Initialize@ProcessStyle@
                                  • String ID:
                                  • API String ID: 606962050-0
                                  • Opcode ID: 0fbeed469b533d4bb5ea9dbade169466be1bf2c3129f18db08bb1dbfaa2eaaae
                                  • Instruction ID: 6b772b3e290da0b5b18ebfd2bf10ffd70a63307492a353892a4c5183fdd5a41b
                                  • Opcode Fuzzy Hash: 0fbeed469b533d4bb5ea9dbade169466be1bf2c3129f18db08bb1dbfaa2eaaae
                                  • Instruction Fuzzy Hash: 1EF0A43A612251EBDB511F94AC1CF5A7B69FB88B62F10401AFA0D87381CB718C1187A0
                                  APIs
                                  • SysFreeString.OLEAUT32(00000000), ref: 002AEA4F
                                    • Part of subcall function 0029A874: SysFreeString.OLEAUT32(00000000), ref: 0029A8DC
                                  • SysFreeString.OLEAUT32(00000000), ref: 002AE9D7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeString
                                  • String ID: Configuration::ValidateAnswer$Dwz ERROR: %s:%d - hr = 0x%08X$Value
                                  • API String ID: 3341692771-2190982714
                                  • Opcode ID: 216cc06c04935a4863ff422a1f17f85137af9a4468b39f41e116ecc7b3c29747
                                  • Instruction ID: 29d49b1a408f7b33d4c9718b85a9c5b3421ba74b0846f22137f1c22b4b5cc9bb
                                  • Opcode Fuzzy Hash: 216cc06c04935a4863ff422a1f17f85137af9a4468b39f41e116ecc7b3c29747
                                  • Instruction Fuzzy Hash: C641C231E20216ABDF00DF94C889AAFB7B5FF85710F12406EE105A7281CF74AE16DB91
                                  APIs
                                  • CoCreateInstance.OLE32(002848E8,00000000,00000015,002848A8,?,00000000,?,00000000,002AB059,00000000,?,00000000,?,?,00000000), ref: 0029A073
                                  • SysAllocString.OLEAUT32(?), ref: 0029A0AF
                                  • SysFreeString.OLEAUT32(00000000), ref: 0029A146
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$AllocCreateFreeInstance
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$DwzXmlCreate
                                  • API String ID: 391255401-537507572
                                  • Opcode ID: 8b37dc2c89ae78a6d58cadb8d52f4a7e16cb8a172edf49a9ae97bc2a524db25e
                                  • Instruction ID: 9ad92d977448393fcaffefd306dd7bcedbe5de4bc71e59f95e2d261f02c7dccc
                                  • Opcode Fuzzy Hash: 8b37dc2c89ae78a6d58cadb8d52f4a7e16cb8a172edf49a9ae97bc2a524db25e
                                  • Instruction Fuzzy Hash: 01311535B60316ABDF109B58DC4DF6E3BB8EF89720F10406AF505E7390DAB09C158B92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ConsentToResolution$Dwz ERROR: %s:%d - hr = 0x%08X
                                  • API String ID: 0-3674125845
                                  • Opcode ID: b6a3d338759725632406a8b05df41e136cfa3429b8808c38beb0f33e8563dbd7
                                  • Instruction ID: c216ee1771c7c33540c54feb6f952cca3ea30fa7663171d44f080f6b0fd2e30f
                                  • Opcode Fuzzy Hash: b6a3d338759725632406a8b05df41e136cfa3429b8808c38beb0f33e8563dbd7
                                  • Instruction Fuzzy Hash: 73218E31EB5662A7E7211E9D5C49FEA7B849B817E0B100131FD09EB292F5A4CC2096C0
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,00000000,?,?,?,002AAE91), ref: 002BC931
                                  • HeapFree.KERNEL32(00000000,?,?,00000000,?,?,?,002AAE91), ref: 002BC938
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreePrintProcess
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$Packages_Keywords
                                  • API String ID: 2870207377-1444590826
                                  • Opcode ID: d218f641008503daacb7cb42c58994c07f30b81ad5d2ca12bb75ea63f466e62c
                                  • Instruction ID: 8e11b962f7dc9f7b76cfab485290218b62af23a60b8210660daa3244e22f3ae9
                                  • Opcode Fuzzy Hash: d218f641008503daacb7cb42c58994c07f30b81ad5d2ca12bb75ea63f466e62c
                                  • Instruction Fuzzy Hash: 4B112C76A31601B7FB107B999D47DFF762C9B44B50B25005DB903E7187E6A19E2087A0
                                  APIs
                                  • SysFreeString.OLEAUT32(00000000), ref: 00293168
                                  • SysFreeString.OLEAUT32(00000000), ref: 00293174
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeString$Print
                                  • String ID: %s%s$Dwz ERROR: %s:%d - hr = 0x%08X$IntroPage::OnGetInfoTip
                                  • API String ID: 641130261-432333135
                                  • Opcode ID: 21f7071036589121ffbd3f6b198e1e11c89a68d1cff2d9ff5f3e38cda0877d1a
                                  • Instruction ID: f78bb4257d30f9088451d3e5268b12e51ef30c8c5051a8bd17692ed80d408485
                                  • Opcode Fuzzy Hash: 21f7071036589121ffbd3f6b198e1e11c89a68d1cff2d9ff5f3e38cda0877d1a
                                  • Instruction Fuzzy Hash: 50115C7132030167EF217AA5DD42E7B76AD9F90B10F040428F80A921E3EEA1E9304B61
                                  APIs
                                  • GetTempFileNameW.KERNEL32(?,Pkg,00000000,00000000,00000000,00000000,00000000), ref: 002B50F6
                                  • GetLastError.KERNEL32 ref: 002B5100
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastNameTemp
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$GetTemporaryFileName$Pkg
                                  • API String ID: 110269551-1835466015
                                  • Opcode ID: 6e57430d49216bef68a708f7be6dc193d8103c46f1a6520b47b3b47a77f185aa
                                  • Instruction ID: 9655efea832ea4a0438a8e4d9587989809809d1781b54f19d0ecf3c64f2ccf5f
                                  • Opcode Fuzzy Hash: 6e57430d49216bef68a708f7be6dc193d8103c46f1a6520b47b3b47a77f185aa
                                  • Instruction Fuzzy Hash: B1012B76F7273463D730ABA95C0BFDB7B689B40B90F11415AF805EB2C1D9A1DD108AD0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeString_wcsicmp
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$DwzXmlCheckNode$Interaction
                                  • API String ID: 2098340043-624765833
                                  • Opcode ID: dd3cc729058fc06eae8237a16cb07320bff2ce6cf6017573245a15a6ca6e0f78
                                  • Instruction ID: 2e064b3ebc84fc57bbc681be74f47fd2ce8fb3eb1bec18ef10f9cabaab5bb5f9
                                  • Opcode Fuzzy Hash: dd3cc729058fc06eae8237a16cb07320bff2ce6cf6017573245a15a6ca6e0f78
                                  • Instruction Fuzzy Hash: 1CF0D672A12214FBEF109789EC0DE8F7BA8EF85720F25406AF505B7190D7B09D1196E5
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00000000,00000000,?,0029105F), ref: 002910B1
                                  • HeapAlloc.KERNEL32(00000000,?,0029105F), ref: 002910B8
                                  • ??0ClassInfoBase@DirectUI@@QAE@XZ.DUI70(?,0029105F), ref: 002910C6
                                  • ?Initialize@ClassInfoBase@DirectUI@@QAEJPAUHINSTANCE__@@PBG_NPBQBUPropertyInfo@2@I@Z.DUI70(00280000,WebBrowser,00000000,00000000,00000000,?,0029105F), ref: 002910E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Base@ClassDirectHeapInfo$AllocE__@@Info@2@Initialize@ProcessProperty
                                  • String ID: WebBrowser
                                  • API String ID: 2570828156-3032121266
                                  • Opcode ID: f54e19ed1f817b9f24d143ab3a246373ebd2cde99012d1df5c10b3a815c5a2f8
                                  • Instruction ID: 4838eb722fd8ac2c615fd1bc691356f798cb46e5a21b12361a057cc49b5d7335
                                  • Opcode Fuzzy Hash: f54e19ed1f817b9f24d143ab3a246373ebd2cde99012d1df5c10b3a815c5a2f8
                                  • Instruction Fuzzy Hash: 03F0FC3B7212E257CB212B576C1DF1B7F59D7C5B11B100025F90147381CE728C6187B1
                                  APIs
                                  • TlsGetValue.KERNEL32 ref: 00290906
                                  • ForwardGadgetMessage.DUSER(?,00000106,?,?,?), ref: 0029098B
                                  • GetKeyState.USER32(00000011), ref: 002909B6
                                  • GetKeyState.USER32(00000010), ref: 002909EB
                                  • CallNextHookEx.USER32(?,?,?,?), ref: 00290A52
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: State$CallForwardGadgetHookMessageNextValue
                                  • String ID:
                                  • API String ID: 1049943200-0
                                  • Opcode ID: 8e62fa09c69e315645168a785f6c6b9d276897c3f83a3643459a2bcf0b68661f
                                  • Instruction ID: 107d541997e08b9c381136233a6c7f7f107090d9ab9e5f032f8c01f39cc1d5a5
                                  • Opcode Fuzzy Hash: 8e62fa09c69e315645168a785f6c6b9d276897c3f83a3643459a2bcf0b68661f
                                  • Instruction Fuzzy Hash: 4641923491170ADFDF248F58D8C8AAD7BB5EB44750F14846AED0AD7261D770DCA0DB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeString$free
                                  • String ID:
                                  • API String ID: 245561499-0
                                  • Opcode ID: c86740c828ca8ba096388f6835b2439446f15a7ac867e38f233aca3b62f26304
                                  • Instruction ID: 8df1934650fd6cf13790bbeec8754f84a5c9d25ed183248205d1105121b19090
                                  • Opcode Fuzzy Hash: c86740c828ca8ba096388f6835b2439446f15a7ac867e38f233aca3b62f26304
                                  • Instruction Fuzzy Hash: 5401C576821B12DFCB215F61E888417FBE5FF45715714492EE1D292A20DB71ACA1DF80
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000008,000000D4), ref: 0028F865
                                  • HeapAlloc.KERNEL32(00000000), ref: 0028F86C
                                  • ??0Edit@DirectUI@@QAE@XZ.DUI70 ref: 0028F87A
                                  • ?Initialize@Edit@DirectUI@@QAEJIPAVElement@2@PAK@Z.DUI70(00000003,?), ref: 0028F897
                                  • ?Destroy@Element@DirectUI@@QAEJ_N@Z.DUI70(00000000), ref: 0028F8AB
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Direct$Edit@Heap$AllocDestroy@Element@Element@2@Initialize@Process
                                  • String ID:
                                  • API String ID: 3883584486-0
                                  • Opcode ID: 8ef19c7508e8a7c42a1f6e235747ecaf4e72d40d84a0617976a415ed47199fc6
                                  • Instruction ID: 818bd4b747b997280e140568b09790918b4a10f54f43edf550f675c5bda76f50
                                  • Opcode Fuzzy Hash: 8ef19c7508e8a7c42a1f6e235747ecaf4e72d40d84a0617976a415ed47199fc6
                                  • Instruction Fuzzy Hash: 88F04436A52315ABD7611F55AC1CB5E7B65FBC4B62F240029F6095B3C0CB7198118BA1
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 002B3198
                                  • SysFreeString.OLEAUT32(?), ref: 002B3341
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeString
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$SupportDownload
                                  • API String ID: 3341692771-2806832860
                                  • Opcode ID: cf241ab6047d51697905675eb5af4b21eb4355fae796239f0af5fe419a58c78b
                                  • Instruction ID: 27d76812089c855ee290ebb53350f2ed7555b2a4860b2e95a54541c88397d591
                                  • Opcode Fuzzy Hash: cf241ab6047d51697905675eb5af4b21eb4355fae796239f0af5fe419a58c78b
                                  • Instruction Fuzzy Hash: C051E731E626259BEB20DB14CC89BDA77B5EF447A0F1041E5E909AB280DE709F648FD0
                                  APIs
                                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 0029598F
                                  • GetLastError.KERNEL32(?,?,00000001,?,002957B2), ref: 002959FA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: ErrorLastMessageSend
                                  • String ID: CustomizePage::SetupCheckboxes$Dwz ERROR: %s:%d - hr = 0x%08X
                                  • API String ID: 208302064-2668424580
                                  • Opcode ID: adbd624979881fd1bb03538dc4c8461d9f2e80d652ea0d014647bc5fca38410f
                                  • Instruction ID: 37eac93e2365fe16c6a45f3eb502eae317fa0ac4617096def3e52d040daaf1ff
                                  • Opcode Fuzzy Hash: adbd624979881fd1bb03538dc4c8461d9f2e80d652ea0d014647bc5fca38410f
                                  • Instruction Fuzzy Hash: D141D631B20A36DBEF12AF59C845FAE77B5AF84720F150069E805AB381DB70ED118BD0
                                  APIs
                                  • SysFreeString.OLEAUT32(00000000), ref: 002CA9F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeString
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$MetXmlTextFromSingleNode$cfg:PackageConfiguration/cfg:Execution/cfg:Name
                                  • API String ID: 3341692771-1494529425
                                  • Opcode ID: 5be717bc7357a8a217e2a88245c90b7dad5580db5f0cd92b88a9917a3392dc91
                                  • Instruction ID: a7fbd7dd2016bcc3d80f37b4138b7971b3dcc896350e945eae46e2791e17d147
                                  • Opcode Fuzzy Hash: 5be717bc7357a8a217e2a88245c90b7dad5580db5f0cd92b88a9917a3392dc91
                                  • Instruction Fuzzy Hash: D9110471A20208BBDB01DB95CD4AF9E7BB8EB84324F11415DF504E7240DB70EE10CB62
                                  APIs
                                  • SysFreeString.OLEAUT32(00000000), ref: 002AE1F9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: FreeString
                                  • String ID: Configuration::TextFromSingleNode$Dwz ERROR: %s:%d - hr = 0x%08X$cfg:PackageConfiguration/cfg:Execution/cfg:Name
                                  • API String ID: 3341692771-3760372235
                                  • Opcode ID: 058bd603e50712334ffff62b99674d5675740478affba97e07d60d449f263aee
                                  • Instruction ID: 9e763b4495d649c197626fabc4f108b2cc27e7306b30c6b17e20f3d0356b1702
                                  • Opcode Fuzzy Hash: 058bd603e50712334ffff62b99674d5675740478affba97e07d60d449f263aee
                                  • Instruction Fuzzy Hash: C2119075A20215ABEF00DB95DC49FAE7BB8EB86321F110059F505E7240DAB0EE11CB61
                                  APIs
                                  • ?DUICreatePropertySheetPage@TaskPage@DirectUI@@QAEJPAUHINSTANCE__@@@Z.DUI70(00000000,00000000,?,?,00297BB0,00000000,00000400,00000400), ref: 002978FC
                                  • SendMessageW.USER32(?,00000467,00000000,?), ref: 0029791D
                                  Strings
                                  • PageManager::AddPage, xrefs: 00297948
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 0029794D
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Page@$CreateDirectE__@@@MessagePropertySendSheetTask
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$PageManager::AddPage
                                  • API String ID: 1637362170-2503383340
                                  • Opcode ID: 4ffa6dd1b61c39390d0c0d51f697d72b205894e66109c767f78a85cf8a655114
                                  • Instruction ID: 1b1366b3d7fd9a4505d425c2af86b050033f76e28c9a8a787428b78edc9d1dc7
                                  • Opcode Fuzzy Hash: 4ffa6dd1b61c39390d0c0d51f697d72b205894e66109c767f78a85cf8a655114
                                  • Instruction Fuzzy Hash: 110147327692217BEF102A4AAC09F57BF58FB14770F004125FA08EB391C761DC308AD0
                                  Strings
                                  • Met ERROR: %s:%d - hr = 0x%08X, xrefs: 002CA0A6
                                  • PackageInfo::set_Description, xrefs: 002CA0A1
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$PackageInfo::set_Description
                                  • API String ID: 0-2220233934
                                  • Opcode ID: b2f5c5ca16937b75a935c97cea280fc861b1b28ed458c4cb2ffc98598ca1c45a
                                  • Instruction ID: dc104b0cd8b05d22743caf5395066f53ac4ef1339c4b35fcd000925eb0b13140
                                  • Opcode Fuzzy Hash: b2f5c5ca16937b75a935c97cea280fc861b1b28ed458c4cb2ffc98598ca1c45a
                                  • Instruction Fuzzy Hash: 9701F531661326BBD7201F54DC09F967A24BF01799F10032DF9046A1D0D7F0ACB0C6D2
                                  Strings
                                  • PackageInfo::set_Publisher, xrefs: 002CA12C
                                  • Met ERROR: %s:%d - hr = 0x%08X, xrefs: 002CA131
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$PackageInfo::set_Publisher
                                  • API String ID: 0-3595707106
                                  • Opcode ID: 387d70f28a4d691343d877c3be7b129b20173ad24ff1cdc6a3b3938b7ee39cd0
                                  • Instruction ID: 5041f1886c75510bf7a9c83cd79caf1ac9f5bd26c84c5326c409d798896dceaa
                                  • Opcode Fuzzy Hash: 387d70f28a4d691343d877c3be7b129b20173ad24ff1cdc6a3b3938b7ee39cd0
                                  • Instruction Fuzzy Hash: 9501F93156161AB7D7201E45EC0AF567A64AB01799F14032EBD08665D0D7F1ADB0C6E2
                                  Strings
                                  • Met ERROR: %s:%d - hr = 0x%08X, xrefs: 002CA1BC
                                  • PackageInfo::set_Version, xrefs: 002CA1B7
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$PackageInfo::set_Version
                                  • API String ID: 0-1562407323
                                  • Opcode ID: e05df6e6c25fe1b8c5bb5a44c240e5dcb0b00f63dbddb7c26663538d004252df
                                  • Instruction ID: e99b8d164135f85ea8eb5496e3203b30c3983cc76a8315d471269e6735da8bc2
                                  • Opcode Fuzzy Hash: e05df6e6c25fe1b8c5bb5a44c240e5dcb0b00f63dbddb7c26663538d004252df
                                  • Instruction Fuzzy Hash: 3E01283156271AB7D7211E46DC0DF527A64AF21798F280329F90DAA5D0C7F0A9F1C6D2
                                  APIs
                                  • SysAllocString.OLEAUT32(?), ref: 002A20E5
                                  • SysFreeString.OLEAUT32(00000000), ref: 002A213C
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$EngineCallback::LoadSecurityBoundarySafe
                                  • API String ID: 2942722667-3952964465
                                  • Opcode ID: 3241e54fcbd91e0a0ef228e1c9d52066c7b7b3f58bffed5acfd53d75dedb73d3
                                  • Instruction ID: 84242051b06aeed93cc49e4bc39561b55e7bd75fd2f1120e3476d2f7ece6082c
                                  • Opcode Fuzzy Hash: 3241e54fcbd91e0a0ef228e1c9d52066c7b7b3f58bffed5acfd53d75dedb73d3
                                  • Instruction Fuzzy Hash: 0BF02B36BA2221B7D61132CDBC0BE973A59AB62B61F090059F60CB6193EED1CC7046E1
                                  APIs
                                  • SysAllocString.OLEAUT32(?), ref: 002A2159
                                  • SysFreeString.OLEAUT32(00000000), ref: 002A21B0
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$EngineCallback::LoadSupportKey
                                  • API String ID: 2942722667-411673070
                                  • Opcode ID: 8840ede21063a61da20b807c2ea3d11c42e0757114b58b063570e416bc784fc0
                                  • Instruction ID: fbc0e3ed833fa870eb4cb02c6079149130b0877c43ffbaccbe2b088d9e50beee
                                  • Opcode Fuzzy Hash: 8840ede21063a61da20b807c2ea3d11c42e0757114b58b063570e416bc784fc0
                                  • Instruction Fuzzy Hash: E7F02B36EE2316B7D61133CDAC0EE973A1CAB52B70F450025F60CB6193DE91887086E1
                                  APIs
                                  • SysFreeString.OLEAUT32(6583D6FF), ref: 002BD8A1
                                  • SysAllocString.OLEAUT32(?), ref: 002BD8B0
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002BD883
                                  • Packages_SetKeywords, xrefs: 002BD87E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$Packages_SetKeywords
                                  • API String ID: 2942722667-2100757244
                                  • Opcode ID: cce1b01756ce211601cd96998f7143a1808c536b83eb23b2324b378351b1b82e
                                  • Instruction ID: 13c5b51988d831c6e4f5ea4b5aa1001abe7ca1dc5370e72fe705c396725192d9
                                  • Opcode Fuzzy Hash: cce1b01756ce211601cd96998f7143a1808c536b83eb23b2324b378351b1b82e
                                  • Instruction Fuzzy Hash: D0F0E931531300ABF7116758EE0ABD7B3A8BB41752F40012DEC02A2491FBF1BC21C650
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 002BD8FB
                                  • SysAllocString.OLEAUT32(00000000), ref: 002BD90A
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  • Packages_SetFeedbackContextId, xrefs: 002BD8D8
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002BD8DD
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$Packages_SetFeedbackContextId
                                  • API String ID: 2942722667-1152365832
                                  • Opcode ID: 817a6c5b27a2e9b2b93ec0a596999e74500fa68e6fcc2dca96fad20875841f92
                                  • Instruction ID: 8fdbb4b8419ef5ccbc1329b87cb64ce05252ad15999d78980044bc1b2b80c2c1
                                  • Opcode Fuzzy Hash: 817a6c5b27a2e9b2b93ec0a596999e74500fa68e6fcc2dca96fad20875841f92
                                  • Instruction Fuzzy Hash: 03F0E931522700BBE7116B44EE0BBEBB6B8AF41B55F40002DE402E2891FBB0BD609A50
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 002BD955
                                  • SysAllocString.OLEAUT32(00000000), ref: 002BD964
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  • Packages_SetIcon, xrefs: 002BD932
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002BD937
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$Packages_SetIcon
                                  • API String ID: 2942722667-216816780
                                  • Opcode ID: 10bcdf1c102dcff43e88777149721fc71559fc005b64c88817614e682859c876
                                  • Instruction ID: 064bbb928b982d327502a928de13d0ce84f9b0f6a5ef6ffc7eacf8ec3784e66d
                                  • Opcode Fuzzy Hash: 10bcdf1c102dcff43e88777149721fc71559fc005b64c88817614e682859c876
                                  • Instruction Fuzzy Hash: 98F02E32560700ABE7116B45ED0AFDBB3B89F41761F14012DF406F20A1FBF0ACA0C650
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 002BD9AF
                                  • SysAllocString.OLEAUT32(00000000), ref: 002BD9BE
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  • Packages_SetCategory, xrefs: 002BD98C
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002BD991
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$AllocFreePrint
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$Packages_SetCategory
                                  • API String ID: 2942722667-3508842083
                                  • Opcode ID: 0dfd73c2b65d3e96b908079ca54f25dfbd1365eeaee8394a79b94730e6748201
                                  • Instruction ID: a676b0f4a859761672576a47af1df726cfbcd829e469920b9b5fb6488edf941e
                                  • Opcode Fuzzy Hash: 0dfd73c2b65d3e96b908079ca54f25dfbd1365eeaee8394a79b94730e6748201
                                  • Instruction Fuzzy Hash: D2F0E931520700BBE7116B45DD4ABE7B7A8AB41765F54001DF403E2491FBB0BC60C651
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 002C4123
                                  • SysAllocString.OLEAUT32(?), ref: 002C4134
                                  Strings
                                  • PackageCollection::AddFallbackAnswersForFirstPackage, xrefs: 002C414C
                                  • Met ERROR: %s:%d - hr = 0x%08X, xrefs: 002C4151
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: String$AllocFree
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$PackageCollection::AddFallbackAnswersForFirstPackage
                                  • API String ID: 344208780-1031189722
                                  • Opcode ID: 8007acc5be028af50892ad7839ce976860e07e1e71e14b6f15025ac6fbb05cd1
                                  • Instruction ID: cca700d3bef48645dc41e0954409f54dcde49c217cc9d4f9ccbfc119fce19b90
                                  • Opcode Fuzzy Hash: 8007acc5be028af50892ad7839ce976860e07e1e71e14b6f15025ac6fbb05cd1
                                  • Instruction Fuzzy Hash: 44F0E271611226BBC3116F86EC09E87FE28EB50B61B18823AF40C92550EBB0D8E187C0
                                  APIs
                                  • memmove.MSVCRT(?,?,?,?,00000000,?,3FFFFFFF,?,00000000,?,?,00000000,?,|Y-,?), ref: 0029C99A
                                  • memmove.MSVCRT(?,?,?,?,?,?,?,00000000,?,3FFFFFFF,?,00000000,?,?,00000000,?), ref: 0029C9B6
                                  • memmove.MSVCRT(?,?,?,?,00000000,?,?,00000000,?,|Y-,?,?,?,?,0029C597,|Y-), ref: 0029CA13
                                  • memmove.MSVCRT(?,?,00000000,?,00000000,?,?,00000000,?,|Y-,?,?,?,?,0029C597,|Y-), ref: 0029CA6F
                                  • memmove.MSVCRT(?,?,?,?,?,00000000,?,00000000,?,?,00000000,?,|Y-,?), ref: 0029CA8E
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: memmove
                                  • String ID:
                                  • API String ID: 2162964266-0
                                  • Opcode ID: f2dad3cbb77ae1eeabd217ba7a851e01aeab95f44c4510edc3a9bb10a7438876
                                  • Instruction ID: db7d836b5143e10d53e34a9c044bd6c5c7d2b7f212ff4868bb914a7cb38f1287
                                  • Opcode Fuzzy Hash: f2dad3cbb77ae1eeabd217ba7a851e01aeab95f44c4510edc3a9bb10a7438876
                                  • Instruction Fuzzy Hash: BC617272A10119DFCF19DF68C9819AEBBB6EF84310719866DE816DB345DB30EE14CB90
                                  APIs
                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000), ref: 002C4949
                                  • HeapFree.KERNEL32(00000000), ref: 002C4950
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Heap$FreePrintProcess
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$PackageCollection::SaveResults
                                  • API String ID: 2870207377-1119185146
                                  • Opcode ID: 12575e69101c0328d994b1ec4b7a3eae3a9befc74bad3584b65eb240ef850ceb
                                  • Instruction ID: 49fb353692b81916fabefee093e320b4fc04ae894d1a9020fc2493b3da1275c7
                                  • Opcode Fuzzy Hash: 12575e69101c0328d994b1ec4b7a3eae3a9befc74bad3584b65eb240ef850ceb
                                  • Instruction Fuzzy Hash: C2312436E21225BBDB11BB95CC9AF9F7778DB84B10F11021DF805A7281DA70DF208BA0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: calloc$ExceptionThrowfreememmove_s
                                  • String ID:
                                  • API String ID: 1247252271-0
                                  • Opcode ID: 7efc20fe0e2ded42bdccc3909eefb326dc2c5082269759025f0e3412bfb0138f
                                  • Instruction ID: 06fe449e6c9d765660afd854f7534008e0d7633feb2e27483f818acea68b07e7
                                  • Opcode Fuzzy Hash: 7efc20fe0e2ded42bdccc3909eefb326dc2c5082269759025f0e3412bfb0138f
                                  • Instruction Fuzzy Hash: 50110A72A103136FE7251F28E84896AB79DFF45760711412AE814D7640EF79DC22C7D5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: calloc$ExceptionThrowfreememmove_s
                                  • String ID:
                                  • API String ID: 1247252271-0
                                  • Opcode ID: 30c9bc846b22a3b4808e029aa0718c02ef265f12f996713baa289ef7b6a20c2e
                                  • Instruction ID: 916198450f99b205afd48e909c0f0b9b4216151899f21b345b5230e11da17c43
                                  • Opcode Fuzzy Hash: 30c9bc846b22a3b4808e029aa0718c02ef265f12f996713baa289ef7b6a20c2e
                                  • Instruction Fuzzy Hash: F111E372A14623AFD7241F28E84856BF7ACFF41761722422AE814D3240EF75DC22CBD5
                                  APIs
                                    • Part of subcall function 00291A14: StrToID.DUI70(?), ref: 00291A24
                                    • Part of subcall function 00291A14: ?FindDescendent@Element@DirectUI@@QAEPAV12@G@Z.DUI70(?), ref: 00291A30
                                  • SendMessageW.USER32(00000000,00001602,00000000,000000FF), ref: 002A586E
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  • InteractivityPage::ClearButtonImageList, xrefs: 002A584A
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002A584F
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: Descendent@DirectElement@FindMessagePrintSendV12@
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$InteractivityPage::ClearButtonImageList
                                  • API String ID: 294070126-191823717
                                  • Opcode ID: 8ab9f733828f11d4011abba3824b7622e4db61dbb8d71bd3bf5b73216cb2ef0e
                                  • Instruction ID: fcd2a01110fab508fc7117f3a7a7f5ade960b853b243e838772fb8d6ab333c93
                                  • Opcode Fuzzy Hash: 8ab9f733828f11d4011abba3824b7622e4db61dbb8d71bd3bf5b73216cb2ef0e
                                  • Instruction Fuzzy Hash: 81012831B102186BDF10EB95DC06FDFBBB4DB49720F100129F500B61C0DB71AD20C6A4
                                  APIs
                                  • SendMessageW.USER32(?,00000465,00000000,?), ref: 0029788A
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  • PageManager::SwitchToPage, xrefs: 0029789F
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002978A4
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: MessagePrintSend
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$PageManager::SwitchToPage
                                  • API String ID: 1282429637-638218495
                                  • Opcode ID: 43001ed00006b173a6c970169a5aaaf19a2b637260ee38e9abc4ecee1543c2e2
                                  • Instruction ID: df699eaed05cd68bb22056fda81153ec1f6df0c7bb199bdeb093f975e4a5627c
                                  • Opcode Fuzzy Hash: 43001ed00006b173a6c970169a5aaaf19a2b637260ee38e9abc4ecee1543c2e2
                                  • Instruction Fuzzy Hash: B0F0C276711310ABDB109F5AAC4DE477BA9FBC9720B01402EF60997392DA729C11CBA0
                                  APIs
                                  • SysAllocString.OLEAUT32(?), ref: 002CD034
                                  Strings
                                  • Met ERROR: %s:%d - hr = 0x%08X, xrefs: 002CD020
                                  • Resolution::get_Description, xrefs: 002CD01B
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: AllocString
                                  • String ID: Met ERROR: %s:%d - hr = 0x%08X$Resolution::get_Description
                                  • API String ID: 2525500382-2418961911
                                  • Opcode ID: 88a830acad5bfac4a705c0585e69c75eefe4b58bc0652c5a368110e666529969
                                  • Instruction ID: 9485dcc223d757d77786cc175e016d7fc4bf13ff1b8c21fbd436c5c99d4def77
                                  • Opcode Fuzzy Hash: 88a830acad5bfac4a705c0585e69c75eefe4b58bc0652c5a368110e666529969
                                  • Instruction Fuzzy Hash: 66E02376271215B3E72016895C06F537F08CF92BB0F25013EF5086B1D1D1A69C7393E1
                                  APIs
                                  • SafeArrayCreate.OLEAUT32(00000008,00000001,?), ref: 002A8928
                                    • Part of subcall function 002999E8: DbgPrintEx.NTDLL ref: 00299A27
                                  Strings
                                  • Dwz ERROR: %s:%d - hr = 0x%08X, xrefs: 002A8942
                                  • InteractivityTextPage::GetUserChoices, xrefs: 002A893D
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: ArrayCreatePrintSafe
                                  • String ID: Dwz ERROR: %s:%d - hr = 0x%08X$InteractivityTextPage::GetUserChoices
                                  • API String ID: 1111234301-2275007817
                                  • Opcode ID: 0ff9b9aba88a7725913152d496aa47f29c984793baef86a192d892bcbf7cd5e0
                                  • Instruction ID: 5ad853499276876ca6b7d355f15b62d4e16160ce7d88a5d91b515bf285170650
                                  • Opcode Fuzzy Hash: 0ff9b9aba88a7725913152d496aa47f29c984793baef86a192d892bcbf7cd5e0
                                  • Instruction Fuzzy Hash: 15F020B1A60219BBEB106B81CC06F9B3E9CDB43B20F004019B804BA281E9F19A5087E1
                                  APIs
                                  • memmove.MSVCRT(00000000,?,00000001,00000000,7FFFFFFF,00000001,00000000,?,?), ref: 0029F9DD
                                  • memmove.MSVCRT(00000000,?,00000001,00000000,?,00000001,00000000,7FFFFFFF,00000001,00000000,?,?), ref: 0029F9EC
                                  • memmove.MSVCRT(00000000,?,?,00000000,?,00000001,00000000,?,00000001,00000000,7FFFFFFF,00000001,00000000,?,?), ref: 0029FA01
                                  • memmove.MSVCRT(?,?,00000001,00000001,00000000,?,?), ref: 0029FA3D
                                  Memory Dump Source
                                  • Source File: 00000005.00000002.4502325563.0000000000280000.00000040.80000000.00040000.00000000.sdmp, Offset: 00280000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_5_2_280000_msdt.jbxd
                                  Similarity
                                  • API ID: memmove
                                  • String ID:
                                  • API String ID: 2162964266-0
                                  • Opcode ID: b97738f4e3d3ae60e5cf5ba7f07a23e8b5136441c4a2cd6244d3cc2368391f82
                                  • Instruction ID: 32b3125b7d0ecd738592c694f3220c2e3aa6748c680b27052b072bff8e100d23
                                  • Opcode Fuzzy Hash: b97738f4e3d3ae60e5cf5ba7f07a23e8b5136441c4a2cd6244d3cc2368391f82
                                  • Instruction Fuzzy Hash: F331DFB2910606BBCB44EFA8DA84D9EBB69FF443107104629F91AD7681DB31E935CF90