Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
offer_doc.exe

Overview

General Information

Sample Name:offer_doc.exe
Analysis ID:680343
MD5:915026107719604ff39f95cd37c6da08
SHA1:7708c1a71b95b019ff7d02e295938b342f2bdfb7
SHA256:f6d4110e70ad9d1525395ad0f693bb5132d7684c989bc2e6ab2e4b12a22223f0
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • offer_doc.exe (PID: 5428 cmdline: "C:\Users\user\Desktop\offer_doc.exe" MD5: 915026107719604FF39F95CD37C6DA08)
    • offer_doc.exe (PID: 4516 cmdline: C:\Users\user\Desktop\offer_doc.exe MD5: 915026107719604FF39F95CD37C6DA08)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "info@rwan.asia", "Password": "RWAN802754", "Host": "mail.rwan.asia"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
        • 0x3009d:$a13: get_DnsResolver
        • 0x2e8b2:$a20: get_LastAccessed
        • 0x30a1b:$a27: set_InternalServerPort
        • 0x30d37:$a30: set_GuidMasterKey
        • 0x2e9b9:$a33: get_Clipboard
        • 0x2e9c7:$a34: get_Keyboard
        • 0x2fcd0:$a35: get_ShiftKeyDown
        • 0x2fce1:$a36: get_AltKeyDown
        • 0x2e9d4:$a37: get_Password
        • 0x2f480:$a38: get_PasswordHash
        • 0x3049d:$a39: get_DefaultCredentials
        00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_e577e17eunknownunknown
        • 0x8004:$a: 20 4D 27 00 00 33 DB 19 0B 00 07 17 FE 01 2C 02 18 0B 00 07
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        0.2.offer_doc.exe.3bd37a8.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0.2.offer_doc.exe.3bd37a8.7.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            0.2.offer_doc.exe.3bd37a8.7.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
            • 0x30d4f:$s10: logins
            • 0x307b6:$s11: credential
            • 0x2cdb9:$g1: get_Clipboard
            • 0x2cdc7:$g2: get_Keyboard
            • 0x2cdd4:$g3: get_Password
            • 0x2e0c0:$g4: get_CtrlKeyDown
            • 0x2e0d0:$g5: get_ShiftKeyDown
            • 0x2e0e1:$g6: get_AltKeyDown
            0.2.offer_doc.exe.3bd37a8.7.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
            • 0x2e49d:$a13: get_DnsResolver
            • 0x2ccb2:$a20: get_LastAccessed
            • 0x2ee1b:$a27: set_InternalServerPort
            • 0x2f137:$a30: set_GuidMasterKey
            • 0x2cdb9:$a33: get_Clipboard
            • 0x2cdc7:$a34: get_Keyboard
            • 0x2e0d0:$a35: get_ShiftKeyDown
            • 0x2e0e1:$a36: get_AltKeyDown
            • 0x2cdd4:$a37: get_Password
            • 0x2d880:$a38: get_PasswordHash
            • 0x2e89d:$a39: get_DefaultCredentials
            0.2.offer_doc.exe.3bd37a8.7.unpackWindows_Trojan_AgentTesla_e577e17eunknownunknown
            • 0x6404:$a: 20 4D 27 00 00 33 DB 19 0B 00 07 17 FE 01 2C 02 18 0B 00 07
            Click to see the 28 entries
            No Sigma rule has matched
            Timestamp:192.168.2.5119.59.104.27497195872030171 08/08/22-12:37:22.771751
            SID:2030171
            Source Port:49719
            Destination Port:587
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.5119.59.104.27497195872840032 08/08/22-12:37:22.771866
            SID:2840032
            Source Port:49719
            Destination Port:587
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.5119.59.104.27497195872851779 08/08/22-12:37:22.771866
            SID:2851779
            Source Port:49719
            Destination Port:587
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: offer_doc.exeReversingLabs: Detection: 24%
            Source: offer_doc.exeJoe Sandbox ML: detected
            Source: 3.0.offer_doc.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
            Source: 3.0.offer_doc.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "info@rwan.asia", "Password": "RWAN802754", "Host": "mail.rwan.asia"}
            Source: offer_doc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: offer_doc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49719 -> 119.59.104.27:587
            Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.5:49719 -> 119.59.104.27:587
            Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49719 -> 119.59.104.27:587
            Source: Joe Sandbox ViewASN Name: METRABYTE-TH453LadplacoutJorakhaebuaTH METRABYTE-TH453LadplacoutJorakhaebuaTH
            Source: global trafficTCP traffic: 192.168.2.5:49719 -> 119.59.104.27:587
            Source: global trafficTCP traffic: 192.168.2.5:49719 -> 119.59.104.27:587
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://dzByIm.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: offer_doc.exe, 00000003.00000002.678536332.00000000030EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.rwan.asia
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: offer_doc.exe, 00000000.00000002.434864485.0000000001097000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
            Source: offer_doc.exe, 00000003.00000002.678536332.00000000030EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hI6edvnAmdv.org
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
            Source: unknownDNS traffic detected: queries for: mail.rwan.asia
            Source: offer_doc.exe, 00000000.00000002.433866824.0000000000C0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            System Summary

            barindex
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: initial sampleStatic PE information: Filename: offer_doc.exe
            Source: 3.0.offer_doc.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bBFEAAEE6u002d466Du002d4D0Au002d8579u002d0D52F9710340u007d/u0038E7E1D9Bu002d4103u002d4A26u002d9CEAu002d5E7F2E73DD6F.csLarge array initialization: .cctor: array initializer size 11630
            Source: offer_doc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_00BFCD040_2_00BFCD04
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_00BFF0D00_2_00BFF0D0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_06ED41D00_2_06ED41D0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_06ED4F280_2_06ED4F28
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_07105DC80_2_07105DC8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_071055900_2_07105590
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_071055A00_2_071055A0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_07106F9A0_2_07106F9A
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_07106FA80_2_07106FA8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0140F0803_2_0140F080
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_014061203_2_01406120
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0140F3C83_2_0140F3C8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637BFB83_2_0637BFB8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063784403_2_06378440
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637C0C43_2_0637C0C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063776A83_2_063776A8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063732A83_2_063732A8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AA2783_2_066AA278
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AAA883_2_066AAA88
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A87403_2_066A8740
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AF3383_2_066AF338
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A7BC83_2_066A7BC8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066ABB803_2_066ABB80
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A38C03_2_066A38C0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A28D03_2_066A28D0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066ABB1C3_2_066ABB1C
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AA9393_2_066AA939
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A89303_2_066A8930
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066FADE83_2_066FADE8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066F1AC43_2_066F1AC4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066F4B103_2_066F4B10
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637A7E83_2_0637A7E8
            Source: offer_doc.exe, 00000000.00000002.438858978.0000000002B0B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.452768106.0000000006EB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.433866824.0000000000C0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.453065620.0000000006F00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000003.423409650.0000000000C95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.453449981.0000000007070000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000000.407180408.00000000005EE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSYSTEMI.exeB vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQIPpUdJOXlzKKWqWQXrayNItXcNYucwtbWIvIC.exe4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQIPpUdJOXlzKKWqWQXrayNItXcNYucwtbWIvIC.exe4 vs offer_doc.exe
            Source: offer_doc.exe, 00000003.00000000.431756265.0000000000436000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQIPpUdJOXlzKKWqWQXrayNItXcNYucwtbWIvIC.exe4 vs offer_doc.exe
            Source: offer_doc.exe, 00000003.00000002.673994817.0000000000BE8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs offer_doc.exe
            Source: offer_doc.exe, 00000003.00000002.674351176.000000000101A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs offer_doc.exe
            Source: offer_doc.exeBinary or memory string: OriginalFilenameSYSTEMI.exeB vs offer_doc.exe
            Source: offer_doc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: offer_doc.exeReversingLabs: Detection: 24%
            Source: offer_doc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\offer_doc.exe "C:\Users\user\Desktop\offer_doc.exe"
            Source: C:\Users\user\Desktop\offer_doc.exeProcess created: C:\Users\user\Desktop\offer_doc.exe C:\Users\user\Desktop\offer_doc.exe
            Source: C:\Users\user\Desktop\offer_doc.exeProcess created: C:\Users\user\Desktop\offer_doc.exe C:\Users\user\Desktop\offer_doc.exeJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\offer_doc.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\offer_doc.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
            Source: offer_doc.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\offer_doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: offer_doc.exe, ProcExpGUI/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.0.offer_doc.exe.520000.0.unpack, ProcExpGUI/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 3.0.offer_doc.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 3.0.offer_doc.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: C:\Users\user\Desktop\offer_doc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: offer_doc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: offer_doc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: offer_doc.exe, ProcExpGUI/Form1.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.offer_doc.exe.520000.0.unpack, ProcExpGUI/Form1.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716B2 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716BA push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716A9 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637169E push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637169A push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637168E push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716F1 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716FA push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716E2 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716EA push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716D2 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716D9 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716C1 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716CA push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371732 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371739 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371721 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637172A push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371712 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637171A push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371702 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371709 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371752 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371742 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637174A push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717B2 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717B9 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717A1 push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717AE push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717AA push es; ret 3_2_063718C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371796 push es; ret 3_2_063718C4
            Source: initial sampleStatic PE information: section name: .text entropy: 7.788970576048009
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTR
            Source: offer_doc.exe, 00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmp, offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: offer_doc.exe, 00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmp, offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\offer_doc.exe TID: 5440Thread sleep time: -45877s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exe TID: 3108Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exe TID: 3676Thread sleep count: 9610 > 30Jump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeWindow / User API: threadDelayed 9610Jump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeThread delayed: delay time: 45877Jump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: offer_doc.exe, 00000003.00000003.473613333.00000000010B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\offer_doc.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AB210 LdrInitializeThunk,3_2_066AB210
            Source: C:\Users\user\Desktop\offer_doc.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\offer_doc.exeMemory written: C:\Users\user\Desktop\offer_doc.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeProcess created: C:\Users\user\Desktop\offer_doc.exe C:\Users\user\Desktop\offer_doc.exeJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Users\user\Desktop\offer_doc.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Users\user\Desktop\offer_doc.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTR
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: Yara matchFile source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            Path Interception111
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            211
            Security Software Discovery
            Remote Services1
            Email Collection
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            1
            Input Capture
            1
            Process Discovery
            Remote Desktop Protocol1
            Input Capture
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            1
            Credentials in Registry
            131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares11
            Archive Collected Data
            Automated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object Model2
            Data from Local System
            Scheduled Transfer11
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Obfuscated Files or Information
            Cached Domain Credentials114
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items13
            Software Packing
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            offer_doc.exe24%ReversingLabsByteCode-MSIL.Trojan.Pwsx
            offer_doc.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            3.0.offer_doc.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            https://api.ipify.org%%startupfolder%0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://mail.rwan.asia0%Avira URL Cloudsafe
            http://dzByIm.com0%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
            http://www.fontbureau.como0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            https://api.ipify.org%0%URL Reputationsafe
            https://hI6edvnAmdv.org0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            mail.rwan.asia
            119.59.104.27
            truetrue
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://127.0.0.1:HTTP/1.1offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.apache.org/licenses/LICENSE-2.0offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwoffer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://api.ipify.org%%startupfolder%offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          low
                          http://www.goodfont.co.kroffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://mail.rwan.asiaoffer_doc.exe, 00000003.00000002.678536332.00000000030EA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://dzByIm.comoffer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comloffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cTheoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmloffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNSnamejidpasswordPsi/Psioffer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comooffer_doc.exe, 00000000.00000002.434864485.0000000001097000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fonts.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sandoll.co.kroffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.ipify.org%offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  low
                                  https://hI6edvnAmdv.orgoffer_doc.exe, 00000003.00000002.678536332.00000000030EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  119.59.104.27
                                  mail.rwan.asiaThailand
                                  56067METRABYTE-TH453LadplacoutJorakhaebuaTHtrue
                                  Joe Sandbox Version:35.0.0 Citrine
                                  Analysis ID:680343
                                  Start date and time: 08/08/202212:35:502022-08-08 12:35:50 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 7m 25s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Sample file name:offer_doc.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:18
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 98%
                                  • Number of executed functions: 88
                                  • Number of non-executed functions: 7
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): www.bing.com, licensing.mp.microsoft.com, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, storeedgefd.dsx.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  12:37:00API Interceptor759x Sleep call for process: offer_doc.exe modified
                                  No context
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  METRABYTE-TH453LadplacoutJorakhaebuaTH4R45357rJb.dllGet hashmaliciousBrowse
                                  • 119.59.96.171
                                  0628222 _TOP.exeGet hashmaliciousBrowse
                                  • 119.59.104.13
                                  SecuriteInfo.com.NSIS.Injector.AYR.25274.exeGet hashmaliciousBrowse
                                  • 103.30.127.7
                                  R8y5nWeHzN.exeGet hashmaliciousBrowse
                                  • 103.30.127.7
                                  PO_0002015153,pdf.exeGet hashmaliciousBrowse
                                  • 119.59.104.13
                                  SR20220600525003,pdf.exeGet hashmaliciousBrowse
                                  • 119.59.104.13
                                  09062022.xlsGet hashmaliciousBrowse
                                  • 119.59.126.63
                                  nFRbz7jrkO.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  nFRbz7jrkO.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  6BV8I2Luce.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  Company Profile.exeGet hashmaliciousBrowse
                                  • 119.59.97.17
                                  iH3hkt6Jwi.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  o96osW4H1R.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  vB7vDn9SwA.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  iH3hkt6Jwi.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  KZhK3WeFEd.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  o96osW4H1R.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  vSDDpyhqrI.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  nnQLG95Iw5.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  znINSa9qND.dllGet hashmaliciousBrowse
                                  • 119.59.125.140
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\offer_doc.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1308
                                  Entropy (8bit):5.345811588615766
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                  MD5:2E016B886BDB8389D2DD0867BE55F87B
                                  SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                  SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                  SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.782708595845613
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:offer_doc.exe
                                  File size:833536
                                  MD5:915026107719604ff39f95cd37c6da08
                                  SHA1:7708c1a71b95b019ff7d02e295938b342f2bdfb7
                                  SHA256:f6d4110e70ad9d1525395ad0f693bb5132d7684c989bc2e6ab2e4b12a22223f0
                                  SHA512:96a6c907bf2de1eb5e72c702a91a541b1d34f2ea176fc669f103ad7c80ea1d3e534632a5262215251d077c111f50dcd3d1828c58973ce598c6d22628d9d167f3
                                  SSDEEP:24576:NBZFxgV10k+YG7Cbgu8KPVeCwZOe9IbUDHDl:1gVWCFzDPVeCwc7U
                                  TLSH:2E05BF1BBF147308C5A76AB5EE0BBD6267F61C5D3135E0783A647C4A4AFF301E52242A
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0.................. ........@.. ....................... ............@................................
                                  Icon Hash:00828e8e8686b000
                                  Entrypoint:0x4cceaa
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x62F0B69A [Mon Aug 8 07:09:14 2022 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xcce580x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xce0000x390.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xcaeb00xcb000False0.8195620381773399PGP symmetric key encrypted data - Plaintext or unencrypted data7.788970576048009IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xce0000x3900x400False0.3740234375data2.8957942416950724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xd00000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0xce0580x334data
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  192.168.2.5119.59.104.27497195872030171 08/08/22-12:37:22.771751TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49719587192.168.2.5119.59.104.27
                                  192.168.2.5119.59.104.27497195872840032 08/08/22-12:37:22.771866TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249719587192.168.2.5119.59.104.27
                                  192.168.2.5119.59.104.27497195872851779 08/08/22-12:37:22.771866TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49719587192.168.2.5119.59.104.27
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 8, 2022 12:37:20.559009075 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:20.761368036 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:20.761497974 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:21.500310898 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:21.510185957 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:21.747618914 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:21.749319077 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:21.951539040 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:21.952100992 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.158607006 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.164627075 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.366159916 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.366766930 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.569576025 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.570023060 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.770673990 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.770766020 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.771750927 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.771866083 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.772742987 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.772816896 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.973253965 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.973604918 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:23.125147104 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:23.167823076 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:39:00.131582975 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:39:00.333028078 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:39:00.333506107 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:39:00.334780931 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:39:00.535305977 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:39:00.536053896 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:39:00.536117077 CEST49719587192.168.2.5119.59.104.27
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 8, 2022 12:37:20.161004066 CEST5176953192.168.2.58.8.8.8
                                  Aug 8, 2022 12:37:20.532987118 CEST53517698.8.8.8192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Aug 8, 2022 12:37:20.161004066 CEST192.168.2.58.8.8.80x3028Standard query (0)mail.rwan.asiaA (IP address)IN (0x0001)
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Aug 8, 2022 12:37:20.532987118 CEST8.8.8.8192.168.2.50x3028No error (0)mail.rwan.asia119.59.104.27A (IP address)IN (0x0001)
                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Aug 8, 2022 12:37:21.500310898 CEST58749719119.59.104.27192.168.2.5220 ns61.hostinglotus.net ESMTP Exim 4.94.2 Mon, 08 Aug 2022 17:30:23 +0700
                                  Aug 8, 2022 12:37:21.510185957 CEST49719587192.168.2.5119.59.104.27EHLO 724536
                                  Aug 8, 2022 12:37:21.747618914 CEST58749719119.59.104.27192.168.2.5250-ns61.hostinglotus.net Hello 724536 [102.129.143.3]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPE_CONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Aug 8, 2022 12:37:21.749319077 CEST49719587192.168.2.5119.59.104.27AUTH login aW5mb0Byd2FuLmFzaWE=
                                  Aug 8, 2022 12:37:21.951539040 CEST58749719119.59.104.27192.168.2.5334 UGFzc3dvcmQ6
                                  Aug 8, 2022 12:37:22.158607006 CEST58749719119.59.104.27192.168.2.5235 Authentication succeeded
                                  Aug 8, 2022 12:37:22.164627075 CEST49719587192.168.2.5119.59.104.27MAIL FROM:<info@rwan.asia>
                                  Aug 8, 2022 12:37:22.366159916 CEST58749719119.59.104.27192.168.2.5250 OK
                                  Aug 8, 2022 12:37:22.366766930 CEST49719587192.168.2.5119.59.104.27RCPT TO:<africawire2018@gmail.com>
                                  Aug 8, 2022 12:37:22.569576025 CEST58749719119.59.104.27192.168.2.5250 Accepted
                                  Aug 8, 2022 12:37:22.570023060 CEST49719587192.168.2.5119.59.104.27DATA
                                  Aug 8, 2022 12:37:22.770766020 CEST58749719119.59.104.27192.168.2.5354 Enter message, ending with "." on a line by itself
                                  Aug 8, 2022 12:37:22.772816896 CEST49719587192.168.2.5119.59.104.27.
                                  Aug 8, 2022 12:37:23.125147104 CEST58749719119.59.104.27192.168.2.5250 OK id=1oL01g-00Ephe-V7
                                  Aug 8, 2022 12:39:00.131582975 CEST49719587192.168.2.5119.59.104.27QUIT
                                  Aug 8, 2022 12:39:00.333028078 CEST58749719119.59.104.27192.168.2.5221 ns61.hostinglotus.net closing connection

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:12:36:51
                                  Start date:08/08/2022
                                  Path:C:\Users\user\Desktop\offer_doc.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\offer_doc.exe"
                                  Imagebase:0x520000
                                  File size:833536 bytes
                                  MD5 hash:915026107719604FF39F95CD37C6DA08
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_AgentTesla_e577e17e, Description: unknown, Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low

                                  Target ID:3
                                  Start time:12:37:02
                                  Start date:08/08/2022
                                  Path:C:\Users\user\Desktop\offer_doc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\offer_doc.exe
                                  Imagebase:0x980000
                                  File size:833536 bytes
                                  MD5 hash:915026107719604FF39F95CD37C6DA08
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_AgentTesla_e577e17e, Description: unknown, Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:11.7%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:185
                                    Total number of Limit Nodes:11
                                    execution_graph 29005 710f390 29006 710f3d8 WriteProcessMemory 29005->29006 29008 710f42f 29006->29008 29157 710f4b0 29158 710f4fb ReadProcessMemory 29157->29158 29160 710f53f 29158->29160 29230 710f2a0 29231 710f2e0 VirtualAllocEx 29230->29231 29233 710f31d 29231->29233 29009 bfc1e8 GetCurrentProcess 29010 bfc25b 29009->29010 29011 bfc262 GetCurrentThread 29009->29011 29010->29011 29012 bfc29f GetCurrentProcess 29011->29012 29013 bfc298 29011->29013 29014 bfc2d5 29012->29014 29013->29012 29015 bfc2fd GetCurrentThreadId 29014->29015 29016 bfc32e 29015->29016 29017 710f108 29018 710f14d SetThreadContext 29017->29018 29020 710f195 29018->29020 29234 710f028 29235 710f068 ResumeThread 29234->29235 29237 710f099 29235->29237 29238 710f6a8 29239 710f731 CreateProcessA 29238->29239 29241 710f8f3 29239->29241 29021 6ed73b0 29024 6ed73d6 29021->29024 29025 6ed0420 29024->29025 29026 6ed042b 29025->29026 29027 6ed66ca 29026->29027 29029 6ed3e80 29026->29029 29030 6ed3e8b 29029->29030 29031 6ed67a4 29030->29031 29034 6ed68e0 29030->29034 29043 6ed68d0 29030->29043 29035 6ed6906 29034->29035 29042 6ed6937 29034->29042 29063 6ed0948 29035->29063 29053 6ed01ac 29042->29053 29044 6ed68da 29043->29044 29052 6ed6937 29043->29052 29045 6ed6906 29044->29045 29044->29052 29046 6ed0948 3 API calls 29045->29046 29047 6ed692d 29046->29047 29047->29031 29048 6ed01ac 3 API calls 29049 6ed6af5 29048->29049 29050 6ed01bc 3 API calls 29049->29050 29051 6ed6b1c 29050->29051 29051->29051 29052->29048 29054 6ed01b7 29053->29054 29055 6ed0b2a 29054->29055 29069 6ed0be8 29054->29069 29073 6ed6b55 29054->29073 29077 6ed0c78 29054->29077 29081 6ed6b68 29054->29081 29085 6ed2508 29054->29085 29088 6ed24f8 29054->29088 29091 6ed0bf8 29054->29091 29055->29055 29064 6ed096f 29063->29064 29065 6ed01ac 3 API calls 29064->29065 29066 6ed09cb 29065->29066 29132 6ed01bc 29066->29132 29070 6ed0bf8 29069->29070 29072 6ed0c78 3 API calls 29070->29072 29071 6ed0c58 29071->29055 29072->29071 29074 6ed6b68 29073->29074 29075 6ed0bf8 3 API calls 29074->29075 29076 6ed6bc7 29075->29076 29076->29076 29095 bf9dff 29077->29095 29100 bf9e10 29077->29100 29078 6ed0ca2 29078->29055 29082 6ed6b9f 29081->29082 29083 6ed0bf8 3 API calls 29082->29083 29084 6ed6bc7 29083->29084 29084->29084 29086 6ed2524 29085->29086 29087 6ed0bf8 3 API calls 29085->29087 29086->29055 29087->29086 29089 6ed0bf8 3 API calls 29088->29089 29090 6ed2524 29089->29090 29090->29055 29092 6ed0c0b 29091->29092 29094 6ed0c78 3 API calls 29092->29094 29093 6ed0c58 29093->29055 29094->29093 29096 bf9e10 29095->29096 29104 bf9ef8 29096->29104 29112 bf9f08 29096->29112 29097 bf9e1f 29097->29078 29102 bf9ef8 2 API calls 29100->29102 29103 bf9f08 2 API calls 29100->29103 29101 bf9e1f 29101->29078 29102->29101 29103->29101 29105 bf9f1b 29104->29105 29106 bf9f33 29105->29106 29120 bfa181 29105->29120 29124 bfa190 29105->29124 29106->29097 29107 bf9f2b 29107->29106 29108 bfa130 GetModuleHandleW 29107->29108 29109 bfa15d 29108->29109 29109->29097 29113 bf9f1b 29112->29113 29114 bf9f33 29113->29114 29118 bfa181 LoadLibraryExW 29113->29118 29119 bfa190 LoadLibraryExW 29113->29119 29114->29097 29115 bf9f2b 29115->29114 29116 bfa130 GetModuleHandleW 29115->29116 29117 bfa15d 29116->29117 29117->29097 29118->29115 29119->29115 29121 bfa1a4 29120->29121 29123 bfa1c9 29121->29123 29128 bf9468 29121->29128 29123->29107 29125 bfa1a4 29124->29125 29126 bfa1c9 29125->29126 29127 bf9468 LoadLibraryExW 29125->29127 29126->29107 29127->29126 29130 bfa370 LoadLibraryExW 29128->29130 29131 bfa3e9 29130->29131 29131->29123 29134 6ed01c7 29132->29134 29133 6ed09f3 29134->29133 29135 6ed0948 3 API calls 29134->29135 29135->29134 29136 6eda770 29138 6eda791 29136->29138 29137 6eda7a6 29138->29137 29141 6ed9c8c 29138->29141 29140 6eda801 29142 6ed9c97 29141->29142 29143 6edb2a9 29142->29143 29147 6edbd69 29142->29147 29150 6edbd78 29142->29150 29143->29140 29144 6edb3bc 29144->29140 29153 6ed9f4c 29147->29153 29151 6edbd95 29150->29151 29152 6ed9f4c DrawTextExW 29150->29152 29151->29144 29152->29151 29154 6edbdb0 DrawTextExW 29153->29154 29156 6edbd95 29154->29156 29156->29144 29242 6ed6690 29244 6ed66a0 29242->29244 29243 6ed66ca 29244->29243 29245 6ed3e80 3 API calls 29244->29245 29245->29243 29161 bf40d0 29162 bf40e2 29161->29162 29163 bf40ee 29162->29163 29167 bf41e0 29162->29167 29171 bf388c 29163->29171 29165 bf410d 29168 bf4205 29167->29168 29175 bf42e0 29168->29175 29172 bf3897 29171->29172 29183 bf5b4c 29172->29183 29174 bf71fa 29174->29165 29177 bf4307 29175->29177 29176 bf43e4 29177->29176 29179 bf3e18 29177->29179 29180 bf5370 CreateActCtxA 29179->29180 29182 bf5433 29180->29182 29184 bf5b57 29183->29184 29187 bf6f28 29184->29187 29186 bf731d 29186->29174 29188 bf6f33 29187->29188 29191 bf6f58 29188->29191 29190 bf73fa 29190->29186 29192 bf6f63 29191->29192 29195 bf6f88 29192->29195 29194 bf74ea 29194->29190 29197 bf6f93 29195->29197 29196 bf7c3c 29196->29194 29197->29196 29199 bfbf10 29197->29199 29200 bfbf41 29199->29200 29201 bfbf65 29200->29201 29204 bfc0d0 29200->29204 29208 bfc0c0 29200->29208 29201->29196 29206 bfc0dd 29204->29206 29205 bfc117 29205->29201 29206->29205 29212 bfb594 29206->29212 29209 bfc0d0 29208->29209 29210 bfc117 29209->29210 29211 bfb594 2 API calls 29209->29211 29210->29201 29211->29210 29213 bfb59f 29212->29213 29215 bfca08 29213->29215 29216 bfb67c 29213->29216 29215->29215 29217 bfb687 29216->29217 29218 bf6f88 2 API calls 29217->29218 29219 bfce77 29217->29219 29218->29219 29222 bfe808 29219->29222 29220 bfceb0 29220->29215 29224 bfe885 29222->29224 29225 bfe839 29222->29225 29223 bfe845 29223->29220 29224->29220 29225->29223 29226 bff088 LoadLibraryExW GetModuleHandleW 29225->29226 29227 bff077 LoadLibraryExW GetModuleHandleW 29225->29227 29226->29224 29227->29224 29228 bfc410 DuplicateHandle 29229 bfc4a6 29228->29229
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: UUUU
                                    • API String ID: 0-1798160573
                                    • Opcode ID: 1a5e5e0432d3246e3253de4227a4494c3b52b5790efb7849b167c51dc1035a2c
                                    • Instruction ID: 49ea9e0915ef51d38b9c60fcf88d5132d7ba1a57a727b345ddceb80a14161364
                                    • Opcode Fuzzy Hash: 1a5e5e0432d3246e3253de4227a4494c3b52b5790efb7849b167c51dc1035a2c
                                    • Instruction Fuzzy Hash: 3DA2C675A00228CFDB64CF69C984A99BBF2FF89304F1581E9D509AB365DB319E91CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.452901218.0000000006ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6ed0000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9c196af66660c35bb659ad67ddcd3ec091d5708553379c4589b496136c7f75ba
                                    • Instruction ID: 5f02be53f90b42327fb7b70e0f37ca85df6f7fd369e24b164d712a3572dabf38
                                    • Opcode Fuzzy Hash: 9c196af66660c35bb659ad67ddcd3ec091d5708553379c4589b496136c7f75ba
                                    • Instruction Fuzzy Hash: 2A123734A10218CFCB54DF68D884A9DB7F2FF85305F1585A9E909AB265DB30ED86CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00BFC248
                                    • GetCurrentThread.KERNEL32 ref: 00BFC285
                                    • GetCurrentProcess.KERNEL32 ref: 00BFC2C2
                                    • GetCurrentThreadId.KERNEL32 ref: 00BFC31B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID: H
                                    • API String ID: 2063062207-1105002124
                                    • Opcode ID: cfbe194571669dfb28afd10e2b6df28c74d9452c68c9f82cb85916a010345ab8
                                    • Instruction ID: b1a28aa7cdd7356e026630e1d1aa6430d12ab3478632c640197df5a6bf39a70c
                                    • Opcode Fuzzy Hash: cfbe194571669dfb28afd10e2b6df28c74d9452c68c9f82cb85916a010345ab8
                                    • Instruction Fuzzy Hash: 615175B09042498FDB14CFA9D5487AEBFF0EF89314F24C49AE449B32A1C7345888CF65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 22 bfc1e8-bfc259 GetCurrentProcess 23 bfc25b-bfc261 22->23 24 bfc262-bfc296 GetCurrentThread 22->24 23->24 25 bfc29f-bfc2d3 GetCurrentProcess 24->25 26 bfc298-bfc29e 24->26 28 bfc2dc-bfc2f4 25->28 29 bfc2d5-bfc2db 25->29 26->25 40 bfc2f7 call bfc398 28->40 41 bfc2f7 call bfc788 28->41 42 bfc2f7 call bfc778 28->42 29->28 31 bfc2fd-bfc32c GetCurrentThreadId 33 bfc32e-bfc334 31->33 34 bfc335-bfc397 31->34 33->34 40->31 41->31 42->31
                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 00BFC248
                                    • GetCurrentThread.KERNEL32 ref: 00BFC285
                                    • GetCurrentProcess.KERNEL32 ref: 00BFC2C2
                                    • GetCurrentThreadId.KERNEL32 ref: 00BFC31B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID: H
                                    • API String ID: 2063062207-1105002124
                                    • Opcode ID: 0586281f110dc8e4267c068d3d17d6e459da542dd95905b3b3086c9f660c28a8
                                    • Instruction ID: 65570e5aeed111e2f590e8e5f7513c67e2c9b82050d7c253b4001eba991ebbe8
                                    • Opcode Fuzzy Hash: 0586281f110dc8e4267c068d3d17d6e459da542dd95905b3b3086c9f660c28a8
                                    • Instruction Fuzzy Hash: EC5142B09042088FDB14CFA9D588BAEBFF1EF89314F24845EE449B7290C7756988CB65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0710F8DE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: fc3c835a65563e7111a7acbbd4668b6bd9c5e618be71bd6cfb32a82ba7354300
                                    • Instruction ID: d1eba6f7a3dc03a3314236495e7ae4815aea6c230b8a761846b8fc51201cdef1
                                    • Opcode Fuzzy Hash: fc3c835a65563e7111a7acbbd4668b6bd9c5e618be71bd6cfb32a82ba7354300
                                    • Instruction Fuzzy Hash: 7C916DB1D00219DFDB21CF68C845BDDBBB6BF48314F048569E849A7290DBB49986CFD2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00BFA14E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 888c96084876822cd525f60b2fd2281f0c79ccc772db25d6dfca5eb0197ac46f
                                    • Instruction ID: 71085bfaa97d4a0d0a8823d17f7e03c99cdcbd2653b2d6805a8a5164e9d728aa
                                    • Opcode Fuzzy Hash: 888c96084876822cd525f60b2fd2281f0c79ccc772db25d6dfca5eb0197ac46f
                                    • Instruction Fuzzy Hash: FA710370A00B098FD724DF29D04176AB7F1FF88304F04896ED58AD7A50DB75E95A8F91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 00BF5421
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 9a75d8d03ad6ceeeb67db583a66db4118095322794923ac27ae3786d4b53d39f
                                    • Instruction ID: 42960b2e9efd4e9a2cd5d6673638917987d60ac5e0f2a322316d8539c07a52df
                                    • Opcode Fuzzy Hash: 9a75d8d03ad6ceeeb67db583a66db4118095322794923ac27ae3786d4b53d39f
                                    • Instruction Fuzzy Hash: BC410471C0461CCFDB24CFA9C844B9DBBF1BF89308F21805AD548AB251DB75598ACF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 00BF5421
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: a2460ca55945e609a4be9c6390e8031fbb83a69aeab09475326bd72594bc3f50
                                    • Instruction ID: 8cb884b2c495817e01acd409c4f38ef1aaffbe28a4b99e506ad65c403a71a7e4
                                    • Opcode Fuzzy Hash: a2460ca55945e609a4be9c6390e8031fbb83a69aeab09475326bd72594bc3f50
                                    • Instruction Fuzzy Hash: C4411271C0461CCBDB24DFA9C884BDDBBF5BF88308F218059D549AB251DB75698ACF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,06EDBD95,?,?), ref: 06EDBE47
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.452901218.0000000006ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6ed0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: DrawText
                                    • String ID:
                                    • API String ID: 2175133113-0
                                    • Opcode ID: a3936cb4bc5f3935ac7057084fd2d3ff0963694456105a9a133b43c3edbccd2a
                                    • Instruction ID: 0bbc6b3826f8cd4908c4e129b68fbdb9d270d6cc1905ffea0df0d6f29dda09f1
                                    • Opcode Fuzzy Hash: a3936cb4bc5f3935ac7057084fd2d3ff0963694456105a9a133b43c3edbccd2a
                                    • Instruction Fuzzy Hash: 0831DDB5D003099FDB50CF9AD884AEEBBF4EF48224F15842AE919A7210D374A945CFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,06EDBD95,?,?), ref: 06EDBE47
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.452901218.0000000006ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6ed0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: DrawText
                                    • String ID:
                                    • API String ID: 2175133113-0
                                    • Opcode ID: c9b9a9c404abf1a971d2b8ba72c21fa3e3ad26c8273f7d2a58968edeed4b42c5
                                    • Instruction ID: 7e7c246340a22161e6cf8d698e7157e74277e075cfd649c801ba8023406ed00a
                                    • Opcode Fuzzy Hash: c9b9a9c404abf1a971d2b8ba72c21fa3e3ad26c8273f7d2a58968edeed4b42c5
                                    • Instruction Fuzzy Hash: 2D31EEB5D003099FDB50CF9AD880ADEBBF4FF48324F15842AE919A7210D774A945CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0710F420
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: 246c86442042d5b040f84506fb093bd4cf58a5810ae01ec495cf2f43d42cf87f
                                    • Instruction ID: 801013f3634dc37208e5b2ea72143b9e2e9d0a10187dcffaf72976eab1c9f504
                                    • Opcode Fuzzy Hash: 246c86442042d5b040f84506fb093bd4cf58a5810ae01ec495cf2f43d42cf87f
                                    • Instruction Fuzzy Hash: 212127B59003199FCB10CFA9C885BDEBBF5FF88314F44842AE919A7280C7789945CFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BFC497
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: f527cba7ac22464023af1b125188bad28bfa598c26624c09d02568d04ade4ae3
                                    • Instruction ID: 18131b36c39800b83afc2a018c62dfefd57f3535d4b9c669bc6d940078d17517
                                    • Opcode Fuzzy Hash: f527cba7ac22464023af1b125188bad28bfa598c26624c09d02568d04ade4ae3
                                    • Instruction Fuzzy Hash: A621F4B59002489FDB10CFA9D584AEEBFF4EF48320F14851AE954B3310C378A945CF60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0710F530
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 64def3be929dbe8c9b90a9c011b8c6d256fc361c1a5dc6aa6e3ee2c9b0316088
                                    • Instruction ID: ad7e1d3ede4e370fc62ca3b8952cdb2b0cada34d8d699eb2d345354710201711
                                    • Opcode Fuzzy Hash: 64def3be929dbe8c9b90a9c011b8c6d256fc361c1a5dc6aa6e3ee2c9b0316088
                                    • Instruction Fuzzy Hash: 912116B19002199FCB10CFAAC884AEEBBB5FF88314F54842AE519A7240C7749945CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 0710F186
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID: ContextThread
                                    • String ID:
                                    • API String ID: 1591575202-0
                                    • Opcode ID: abe1a7586aec562593ffa3cd48b07b8ec8ffe8351c7722f69b1550fea4710701
                                    • Instruction ID: aee595b822daa3d3ce1f345392a54eaacf250b2752eddf747b37ffe64444cbbd
                                    • Opcode Fuzzy Hash: abe1a7586aec562593ffa3cd48b07b8ec8ffe8351c7722f69b1550fea4710701
                                    • Instruction Fuzzy Hash: 5B213AB1D003099FDB10CFAAC4857EEBBF4EF89224F548429D559B7280C778A945CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BFC497
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: 7f264d9b95dd616982f228e5de14f0857a734ec7d85dabb90e50fdc9919c5189
                                    • Instruction ID: ce8df0fa7fc77e31bbc0b33e781aafb75da4a138d923ec2b39fd1aa84e882955
                                    • Opcode Fuzzy Hash: 7f264d9b95dd616982f228e5de14f0857a734ec7d85dabb90e50fdc9919c5189
                                    • Instruction Fuzzy Hash: 0221E3B59002089FDB10CF9AD584AEEBBF4EB48320F14841AE914B3310C374A944CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00BFA1C9,00000800,00000000,00000000), ref: 00BFA3DA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 75b6cf6d210d54e668e88235dad6906f6cb035de9eb12c14eab96113b13174b9
                                    • Instruction ID: ec4e9d463ef42119275529a1296dbf952f2e5a369bdb3c8dab65cd8eafcf919a
                                    • Opcode Fuzzy Hash: 75b6cf6d210d54e668e88235dad6906f6cb035de9eb12c14eab96113b13174b9
                                    • Instruction Fuzzy Hash: 641103B69042099FDB14CF9AC444BAEFBF4EB89324F14846ED519B7600C374A949CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00BFA1C9,00000800,00000000,00000000), ref: 00BFA3DA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: ef904d3529791b64fe1cae5c302757bda728c81b12767873d90e1f7253d08ff2
                                    • Instruction ID: 612326fa8c520bbc0cb84b0b6d2700cd0dd47c3e82a973309b6da37e7b299394
                                    • Opcode Fuzzy Hash: ef904d3529791b64fe1cae5c302757bda728c81b12767873d90e1f7253d08ff2
                                    • Instruction Fuzzy Hash: 4A1133B69002498FDB14CFAAC444BEEFBF4EB89310F04842ED519B7600C374A949CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0710F30E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 0650c22bb6c6e299c8f0b5d4b87ba6d038c665c151f5c90c20c9815148c8564d
                                    • Instruction ID: eb67ad459fc4400c4c148b848462a552c7767689d1633ec6f5872fdb1b6d9c1d
                                    • Opcode Fuzzy Hash: 0650c22bb6c6e299c8f0b5d4b87ba6d038c665c151f5c90c20c9815148c8564d
                                    • Instruction Fuzzy Hash: B51137769002099FCB14CFAAC844BDFBBF5EF88324F148819D519B7250C775A945CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: a33ef09b506a3ddb226c6edfb532dc671c760e345cdc0b5b9f98ef5490a1763c
                                    • Instruction ID: 0138c90b35fdffecc96a855cc6be1da79e6f7b40fe0b9d67d655d27d24a5de69
                                    • Opcode Fuzzy Hash: a33ef09b506a3ddb226c6edfb532dc671c760e345cdc0b5b9f98ef5490a1763c
                                    • Instruction Fuzzy Hash: C91166B1D002088FDB24CFAAC4447DEFBF9AF88224F14881AC519B7240C774A945CFA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00BFA14E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 2660cd2a73fc22e06f5241a4f856b159b8ca98e11046a63ab4e64555fe7b9462
                                    • Instruction ID: bad4c9b03a915e06d43ef695ca40da238ca0c50bb81101465f66e62b488916ff
                                    • Opcode Fuzzy Hash: 2660cd2a73fc22e06f5241a4f856b159b8ca98e11046a63ab4e64555fe7b9462
                                    • Instruction Fuzzy Hash: A411C0B6C002498FDB14CF9AC444A9EBBF4EF89324F15855AD519B7600C375A649CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.452901218.0000000006ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6ed0000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 34af4ee11a5f63baa6b29ff33bd6c92401919e66cd3687a8cbe716e13308c6bb
                                    • Instruction ID: 0aa5821b023f6a5191e2185e8ade47b72950d54d24c54d520e316b759540c3c5
                                    • Opcode Fuzzy Hash: 34af4ee11a5f63baa6b29ff33bd6c92401919e66cd3687a8cbe716e13308c6bb
                                    • Instruction Fuzzy Hash: 16726730E00319CFCB50DFA8C984AADBBF2FF88304F1595A9D446AB255D730A996CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 29018155eb4d4d75e310a851b365f75c4d90a4b9cd1e9c0ff956b744dc4063be
                                    • Instruction ID: ab5239f5e88fded2119cb752e8de8353e2d99259ce79a4f1154a7a6465ce7b36
                                    • Opcode Fuzzy Hash: 29018155eb4d4d75e310a851b365f75c4d90a4b9cd1e9c0ff956b744dc4063be
                                    • Instruction Fuzzy Hash: 9A128AF2411F45CEE718CF66ECA85893B61B78532AF504B09D2653AAF2D7B8114ECF84
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.433704991.0000000000BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_bf0000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4345cf59d15974db60c1a4b0e25240c100d5b53181ad4281cce72ee2ce143ab8
                                    • Instruction ID: ea35f8e207dadd5c5ed69cbe250deabef65c837db19c39c8c20ca83bad4a5805
                                    • Opcode Fuzzy Hash: 4345cf59d15974db60c1a4b0e25240c100d5b53181ad4281cce72ee2ce143ab8
                                    • Instruction Fuzzy Hash: 32A14D36E0021D8FCF05DFA5C9445ADBBF2FF85300B1585BAEA15AB261EB31E959CB40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5976718f4d39fcb2d2c9ceb93e6553d7662c4f2704d01089604e9f283018be3b
                                    • Instruction ID: 8ac713c5d078958c60ad48060350d3efb2a4b0435c294b196d57b4c6095c036b
                                    • Opcode Fuzzy Hash: 5976718f4d39fcb2d2c9ceb93e6553d7662c4f2704d01089604e9f283018be3b
                                    • Instruction Fuzzy Hash: 74614D70E052488FD749EF6BE841A8ABBF3EBC4305F04C47AE1149B264EB725947CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0692148e67da645912b0c91e9eb0c1eccf6ba8468c4d450a03abc2e0cd560a12
                                    • Instruction ID: 3f5b93771306f03a1086bc5ae235bf32b6ee83a73fd2dc245f2d69aa568da005
                                    • Opcode Fuzzy Hash: 0692148e67da645912b0c91e9eb0c1eccf6ba8468c4d450a03abc2e0cd560a12
                                    • Instruction Fuzzy Hash: 07612C70E052488FD749EF6BE841A99BBF3EBC4305F04C47AE1149B264EB725946CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6f5c1f00111a1695bbe336eeca225bbb55a7a7461af045085aa18df30023f3f5
                                    • Instruction ID: 91f359ba7de50b66ee31627a7a18faa274a4b03cdca507c41ae696be20525eda
                                    • Opcode Fuzzy Hash: 6f5c1f00111a1695bbe336eeca225bbb55a7a7461af045085aa18df30023f3f5
                                    • Instruction Fuzzy Hash: 254134B1E05A588BEB5CCF6B8D4028AFAF7BFC9201F14C5BA855CAA254EB7015428E41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000000.00000002.454033005.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7100000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f6c8e6a3d9eb9ba5b0a91696a65be40b15a9da6ce719976ba284e870faae05c1
                                    • Instruction ID: 38e033e18de93df67c094d5329d806c8e8748c42386bc5728b3884ee9fb791f2
                                    • Opcode Fuzzy Hash: f6c8e6a3d9eb9ba5b0a91696a65be40b15a9da6ce719976ba284e870faae05c1
                                    • Instruction Fuzzy Hash: 5F4130B1E05A588BEB1CCF6B8D4068EFAF7BFC9301F14C5BA850DAA259EB7015458E41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Execution Graph

                                    Execution Coverage:11.9%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:2.9%
                                    Total number of Nodes:105
                                    Total number of Limit Nodes:7
                                    execution_graph 44987 1404540 44988 1404554 44987->44988 44991 140478a 44988->44991 44998 1404870 44991->44998 45002 140485f 44991->45002 45006 140496c 44991->45006 45010 14049e8 44991->45010 45015 1404986 44991->45015 44999 14048b4 44998->44999 45000 14049ab 44999->45000 45019 1404c67 44999->45019 45003 14048b4 45002->45003 45004 14049ab 45003->45004 45005 1404c67 2 API calls 45003->45005 45005->45004 45007 140491f 45006->45007 45007->45006 45008 14049ab 45007->45008 45009 1404c67 2 API calls 45007->45009 45009->45008 45011 14049ee 45010->45011 45032 1404f30 45011->45032 45036 1404f1f 45011->45036 45012 140455d 45016 1404999 45015->45016 45017 14049ab 45015->45017 45018 1404c67 2 API calls 45016->45018 45018->45017 45020 1404c86 45019->45020 45024 1404cc8 45020->45024 45028 1404cbb 45020->45028 45021 1404c96 45021->45000 45025 1404d02 45024->45025 45026 1404d2c RtlEncodePointer 45025->45026 45027 1404d55 45025->45027 45026->45027 45027->45021 45029 1404d02 45028->45029 45030 1404d2c RtlEncodePointer 45029->45030 45031 1404d55 45029->45031 45030->45031 45031->45021 45033 1404f3e 45032->45033 45033->45012 45034 1404fd7 RtlEncodePointer 45033->45034 45035 1405000 45033->45035 45034->45035 45035->45012 45037 1404f2a 45036->45037 45037->45012 45038 1404fd7 RtlEncodePointer 45037->45038 45039 1405000 45037->45039 45038->45039 45039->45012 45052 140add0 45053 140adee 45052->45053 45056 1409dc0 45053->45056 45055 140ae25 45057 140c8f0 LoadLibraryA 45056->45057 45059 140c9cc 45057->45059 45060 66f64d8 45061 66f6540 CreateWindowExW 45060->45061 45063 66f65fc 45061->45063 45063->45063 45076 66a64a0 45079 66a64bf 45076->45079 45077 66a6728 45078 66a60b4 RegQueryValueExW 45078->45079 45079->45077 45079->45078 45082 66a6752 45079->45082 45088 66a67b0 45079->45088 45083 66a6747 45082->45083 45085 66a675b 45082->45085 45083->45079 45084 66a6771 45084->45079 45085->45084 45086 66a6812 RegOpenKeyExW 45085->45086 45087 66a6876 45086->45087 45089 66a6802 RegOpenKeyExW 45088->45089 45091 66a6876 45089->45091 45112 66ab210 45113 66ab22f LdrInitializeThunk 45112->45113 45115 66ab263 45113->45115 45092 100e3dc 45093 100e3f4 45092->45093 45094 100e44e 45093->45094 45095 66f3afc CallWindowProcW 45093->45095 45099 66f6690 45093->45099 45103 66f6680 45093->45103 45107 66f7368 45093->45107 45095->45094 45100 66f66b6 45099->45100 45101 66f3afc CallWindowProcW 45100->45101 45102 66f66d7 45101->45102 45102->45094 45104 66f6690 45103->45104 45105 66f3afc CallWindowProcW 45104->45105 45106 66f66d7 45105->45106 45106->45094 45109 66f73a5 45107->45109 45110 66f73c9 45109->45110 45111 66f3c24 CallWindowProcW 45109->45111 45111->45110 45040 66f8be0 45041 66f8c10 45040->45041 45042 66f8cfc 45041->45042 45043 66f8c52 45041->45043 45047 66f3afc 45042->45047 45045 66f8caa CallWindowProcW 45043->45045 45046 66f8c59 45043->45046 45045->45046 45048 66f3b07 45047->45048 45050 66f73c9 45048->45050 45051 66f3c24 CallWindowProcW 45048->45051 45051->45050 45064 66fa850 45065 66fa878 45064->45065 45068 66fa8a4 45064->45068 45066 66fa881 45065->45066 45069 66f9cc4 45065->45069 45071 66f9ccf 45069->45071 45070 66fab9b 45070->45068 45071->45070 45073 66f9ce0 45071->45073 45074 66fabd0 OleInitialize 45073->45074 45075 66fac34 45074->45075 45075->45070 45116 66f4890 45117 66f48d8 LoadLibraryExW 45116->45117 45118 66f48d2 45116->45118 45119 66f4909 45117->45119 45118->45117
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3daf4cc2bf43b45a719119c778edd3d63f9db2c0c9177e06939d0e91e99abf4b
                                    • Instruction ID: a48c7fa3c4087574167f1c0df80b366e16cd5f7fb246f81510e47d8ca9790754
                                    • Opcode Fuzzy Hash: 3daf4cc2bf43b45a719119c778edd3d63f9db2c0c9177e06939d0e91e99abf4b
                                    • Instruction Fuzzy Hash: 6E631F31D106598ECB61EF68C844A9DF7B1FF89304F15D69AE458B7221EB34AAC4CF81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 766066d5a47f0ac04b57871fd8b27b8f987ca48b48167937b079293b4ecbe0a8
                                    • Instruction ID: c7cfae2cc61d118354c26ec40ea3e1656a83e13662594aa8cc7f661e171367a7
                                    • Opcode Fuzzy Hash: 766066d5a47f0ac04b57871fd8b27b8f987ca48b48167937b079293b4ecbe0a8
                                    • Instruction Fuzzy Hash: 4963FE30D10659CECB61EF68C884A99F7B1FF99300F15D69AE45877221EB74AAC4CF81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 500592bdbb41b3fd3597b606499908c4fe18ddbdaeb10443353bfc9d7c87a2b6
                                    • Instruction ID: 2dcde4bab825ade37b9cb361d7d2de0769ed041f2818571fc3e503ebe2688a54
                                    • Opcode Fuzzy Hash: 500592bdbb41b3fd3597b606499908c4fe18ddbdaeb10443353bfc9d7c87a2b6
                                    • Instruction Fuzzy Hash: C2D2B030F002059FDB64DBA9D888BADBBE2AF85314F148539E505DB3A5DB38DC46CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3681 66ab210-66ab25c LdrInitializeThunk 3685 66ab263-66ab26f 3681->3685 3686 66ab48a-66ab49d 3685->3686 3687 66ab275-66ab27e 3685->3687 3688 66ab4c4-66ab4c8 3686->3688 3689 66ab4bf 3687->3689 3690 66ab284-66ab299 3687->3690 3691 66ab4ca 3688->3691 3692 66ab4d3 3688->3692 3689->3688 3694 66ab29b-66ab2ae 3690->3694 3695 66ab2b3-66ab2ce 3690->3695 3691->3692 3696 66ab4d4 3692->3696 3697 66ab45e-66ab462 3694->3697 3706 66ab2dc 3695->3706 3707 66ab2d0-66ab2da 3695->3707 3696->3696 3699 66ab46d-66ab476 3697->3699 3700 66ab464 3697->3700 3703 66ab4ba 3699->3703 3704 66ab478-66ab484 3699->3704 3700->3699 3703->3689 3704->3686 3704->3687 3708 66ab2e1-66ab2e3 3706->3708 3707->3708 3709 66ab2fd-66ab395 call 66a9550 call 66a0f60 * 2 3708->3709 3710 66ab2e5-66ab2f8 3708->3710 3731 66ab3a3 3709->3731 3732 66ab397-66ab3a1 3709->3732 3710->3697 3733 66ab3a8-66ab3aa 3731->3733 3732->3733 3734 66ab408-66ab45c 3733->3734 3735 66ab3ac-66ab3ae 3733->3735 3734->3697 3736 66ab3bc 3735->3736 3737 66ab3b0-66ab3ba 3735->3737 3738 66ab3c1-66ab3c3 3736->3738 3737->3738 3738->3734 3740 66ab3c5-66ab406 3738->3740 3740->3734
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682188533.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66a0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 58dcd78f65c514e706d786dc5afbe88c3af18e24c9a5454ebafc6f71ef156f1b
                                    • Instruction ID: c913cfb07145a24ba2e9dbc8ac37fdd5836cebc14eacf65dcb11148e18ba30b6
                                    • Opcode Fuzzy Hash: 58dcd78f65c514e706d786dc5afbe88c3af18e24c9a5454ebafc6f71ef156f1b
                                    • Instruction Fuzzy Hash: 27712830A00309CFDB54EFB5D5586AEBBB2EF84309F108529D006AB7A8DB759D46CF81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 557 66f4190-66f41bb 558 66f437e-66f43b8 557->558 559 66f41c1-66f41cb 557->559 577 66f43ba-66f43e1 558->577 578 66f4439-66f445d call 66f3954 558->578 560 66f41cd-66f41d4 559->560 561 66f41d5-66f41f7 call 66f189c 559->561 568 66f41f9-66f41ff 561->568 569 66f4202-66f4207 561->569 568->569 655 66f420a call 66f43e8 569->655 656 66f420a call 66f43f8 569->656 573 66f420d-66f4231 call 66f189c 579 66f428b-66f4290 573->579 580 66f4233-66f4247 call 66f3934 573->580 577->578 591 66f445f-66f446d call 66f46c1 578->591 592 66f4473-66f4477 578->592 581 66f42a3-66f42ad 579->581 582 66f4292-66f4299 579->582 589 66f4249-66f424d 580->589 590 66f4261 580->590 657 66f42b0 call 66f56e8 581->657 658 66f42b0 call 66f56d8 581->658 582->581 586 66f429b 582->586 586->581 588 66f42b2-66f42ec call 66f3944 call 66f189c 588->558 589->590 594 66f424f-66f4253 589->594 597 66f4263-66f4265 590->597 591->592 602 66f45a8-66f4668 591->602 595 66f448b-66f44cc 592->595 596 66f4479-66f4483 592->596 594->590 600 66f4255-66f425f 594->600 610 66f44ce-66f44d6 595->610 611 66f44d9-66f44e7 595->611 596->595 597->579 601 66f4267-66f426e 597->601 600->597 605 66f4279-66f4280 601->605 606 66f4270-66f4276 601->606 649 66f466a-66f466d 602->649 650 66f4670-66f469b GetModuleHandleW 602->650 605->579 609 66f4282-66f4288 605->609 606->605 609->579 610->611 614 66f450b-66f450d 611->614 615 66f44e9-66f44ee 611->615 616 66f4510-66f4517 614->616 617 66f44f9 615->617 618 66f44f0-66f44f7 call 66f3960 615->618 619 66f4519-66f4521 616->619 620 66f4524-66f452b 616->620 623 66f44fb-66f4509 617->623 618->623 619->620 625 66f452d-66f4535 620->625 626 66f4538-66f4541 620->626 623->616 625->626 630 66f454e-66f4553 626->630 631 66f4543-66f454b 626->631 633 66f4555-66f455c 630->633 634 66f4571-66f457e 630->634 631->630 633->634 636 66f455e-66f456e call 66f1a54 call 66f3970 633->636 639 66f45a1-66f45a7 634->639 640 66f4580-66f459e 634->640 636->634 640->639 649->650 651 66f469d-66f46a3 650->651 652 66f46a4-66f46b8 650->652 651->652 655->573 656->573 657->588 658->588
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: <Ul
                                    • API String ID: 0-802154676
                                    • Opcode ID: db8187f4ab6721d3e958419844a32afcb2aae7871820f5f1dce270049baecf10
                                    • Instruction ID: 30250374f2a9549e6642147d8b619dda6ab34c80d653bfb2fc90294c0823dab4
                                    • Opcode Fuzzy Hash: db8187f4ab6721d3e958419844a32afcb2aae7871820f5f1dce270049baecf10
                                    • Instruction Fuzzy Hash: B8D15670A107048FDBA4DF69D444BAABBF1BF88304F108929E54AEBB51DB35E905CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3751 66f64cd-66f653e 3753 66f6549-66f6550 3751->3753 3754 66f6540-66f6546 3751->3754 3755 66f655b-66f6593 3753->3755 3756 66f6552-66f6558 3753->3756 3754->3753 3757 66f659b-66f65fa CreateWindowExW 3755->3757 3756->3755 3758 66f65fc-66f6602 3757->3758 3759 66f6603-66f663b 3757->3759 3758->3759 3763 66f663d-66f6640 3759->3763 3764 66f6648 3759->3764 3763->3764 3765 66f6649 3764->3765 3765->3765
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066F65EA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 650dc459a69e5b2b050c717f02ce5861e988f1d1cbeb9a4e0ac60867313effa0
                                    • Instruction ID: e088dd867a0157491001bb0f0c3aa7964af3fe82b500787d354d419204e10bcf
                                    • Opcode Fuzzy Hash: 650dc459a69e5b2b050c717f02ce5861e988f1d1cbeb9a4e0ac60867313effa0
                                    • Instruction Fuzzy Hash: EE51CEB1D102099FDF14CFAAC884ADEBBB5FF88314F24812AE919AB210D7709845CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3766 66a6a08-66a6a27 3767 66a6a29-66a6a33 3766->3767 3768 66a6a4c-66a6a5d 3766->3768 3769 66a6a48-66a6a4a 3767->3769 3770 66a6a35-66a6a46 3767->3770 3771 66a6a4b 3768->3771 3774 66a6a5f-66a6ad1 3768->3774 3769->3771 3770->3769 3776 66a6ad9-66a6ae3 3774->3776 3777 66a6ad3-66a6ad6 3774->3777 3778 66a6aef-66a6b31 RegQueryValueExW 3776->3778 3779 66a6ae5-66a6aed 3776->3779 3777->3776 3780 66a6b3a-66a6b74 3778->3780 3781 66a6b33-66a6b39 3778->3781 3779->3778 3785 66a6b7e 3780->3785 3786 66a6b76 3780->3786 3781->3780 3787 66a6b7f 3785->3787 3786->3785 3787->3787
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 066A6B21
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682188533.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66a0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 2c9882a8a7cd99d96f87eba2e48b4011699243533a52b0225cc9a145ead6b060
                                    • Instruction ID: cfefa63fcc297c5ded2aff0ee7b74359b192463fc7d2f6992610e17e13347aa8
                                    • Opcode Fuzzy Hash: 2c9882a8a7cd99d96f87eba2e48b4011699243533a52b0225cc9a145ead6b060
                                    • Instruction Fuzzy Hash: 114104B1E003589FCB10CF99C984A9EBBF5AF48704F18812AE819EB354D7749D16CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3788 66a6752-66a6758 3789 66a675b-66a676f 3788->3789 3790 66a6747-66a674f 3788->3790 3791 66a6771-66a677b 3789->3791 3792 66a6794 3789->3792 3793 66a677d-66a678e 3791->3793 3794 66a6790-66a6793 3791->3794 3795 66a6797-66a67a9 3792->3795 3793->3794 3798 66a67ab-66a6800 3795->3798 3800 66a6808-66a6874 RegOpenKeyExW 3798->3800 3801 66a6802-66a6805 3798->3801 3803 66a687d-66a68b5 3800->3803 3804 66a6876-66a687c 3800->3804 3801->3800 3808 66a68c8 3803->3808 3809 66a68b7-66a68c0 3803->3809 3804->3803 3810 66a68c9 3808->3810 3809->3808 3810->3810
                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 066A6864
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682188533.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66a0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: 272546e133b71114f69c95c80f80c6445f9834965c304b30cb4c5c14cda285aa
                                    • Instruction ID: 6623ac9d8dd6d75f1da75cc20b0488cc7fdd1b7ad5fe6f582ddd0e7559100844
                                    • Opcode Fuzzy Hash: 272546e133b71114f69c95c80f80c6445f9834965c304b30cb4c5c14cda285aa
                                    • Instruction Fuzzy Hash: 184157B1D003499FDB40CF99C584B9EFBF5AF49314F19816AE408AB341D775A845CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3811 66f64d8-66f653e 3812 66f6549-66f6550 3811->3812 3813 66f6540-66f6546 3811->3813 3814 66f655b-66f65fa CreateWindowExW 3812->3814 3815 66f6552-66f6558 3812->3815 3813->3812 3817 66f65fc-66f6602 3814->3817 3818 66f6603-66f663b 3814->3818 3815->3814 3817->3818 3822 66f663d-66f6640 3818->3822 3823 66f6648 3818->3823 3822->3823 3824 66f6649 3823->3824 3824->3824
                                    APIs
                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066F65EA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: CreateWindow
                                    • String ID:
                                    • API String ID: 716092398-0
                                    • Opcode ID: 41f015cc710972e792fa52f723f970814b95ae87205bb1b17db6106cc7f1460d
                                    • Instruction ID: 404aedf15bdf41861069d099d5c715b6c8711d76ad12b00c3ff9bd560645afb1
                                    • Opcode Fuzzy Hash: 41f015cc710972e792fa52f723f970814b95ae87205bb1b17db6106cc7f1460d
                                    • Instruction Fuzzy Hash: 7041CEB1D103499FDB14CF9AC884ADEBBB5BF88314F24822AE919AB210D7759845CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3825 66f3c24-66f8c4c 3828 66f8cfc-66f8d1c call 66f3afc 3825->3828 3829 66f8c52-66f8c57 3825->3829 3836 66f8d1f-66f8d2c 3828->3836 3831 66f8caa-66f8ce2 CallWindowProcW 3829->3831 3832 66f8c59-66f8c90 3829->3832 3834 66f8ceb-66f8cfa 3831->3834 3835 66f8ce4-66f8cea 3831->3835 3838 66f8c99-66f8ca8 3832->3838 3839 66f8c92-66f8c98 3832->3839 3834->3836 3835->3834 3838->3836 3839->3838
                                    APIs
                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 066F8CD1
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: CallProcWindow
                                    • String ID:
                                    • API String ID: 2714655100-0
                                    • Opcode ID: c988f08a5d002fc85dfb7a129aa75d89932f66e6b2332051042455155f7514b8
                                    • Instruction ID: 8194e2e9017b7ae24fa2048a45d02392450f5efae85408b7d83c8e423371390f
                                    • Opcode Fuzzy Hash: c988f08a5d002fc85dfb7a129aa75d89932f66e6b2332051042455155f7514b8
                                    • Instruction Fuzzy Hash: 3C414CB4910205CFDB54CF59C488AAAFBF5FF88314F25859DD619AB321D774A841CFA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3861 140c8e4-140c947 3862 140c980-140c9ca LoadLibraryA 3861->3862 3863 140c949-140c953 3861->3863 3868 140c9d3-140ca04 3862->3868 3869 140c9cc-140c9d2 3862->3869 3863->3862 3864 140c955-140c957 3863->3864 3866 140c959-140c963 3864->3866 3867 140c97a-140c97d 3864->3867 3870 140c965 3866->3870 3871 140c967-140c976 3866->3871 3867->3862 3875 140ca14 3868->3875 3876 140ca06-140ca0a 3868->3876 3869->3868 3870->3871 3871->3871 3873 140c978 3871->3873 3873->3867 3878 140ca15 3875->3878 3876->3875 3877 140ca0c 3876->3877 3877->3875 3878->3878
                                    APIs
                                    • LoadLibraryA.KERNELBASE(?), ref: 0140C9BA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.675700052.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_1400000_offer_doc.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 9e1c56d1476e2b7e18011d8401c46f639263fbbcf091137c8af537b0233c4c96
                                    • Instruction ID: b25565e3e555803ef313f7aa98c7790c3d346645f4e9e03bd713592a44822f8f
                                    • Opcode Fuzzy Hash: 9e1c56d1476e2b7e18011d8401c46f639263fbbcf091137c8af537b0233c4c96
                                    • Instruction Fuzzy Hash: 8E3127B0D00249CFDB15CFA9C485BEEBFB1BB48314F14826AE815A7390D7749486CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3842 1409dc0-140c947 3844 140c980-140c9ca LoadLibraryA 3842->3844 3845 140c949-140c953 3842->3845 3850 140c9d3-140ca04 3844->3850 3851 140c9cc-140c9d2 3844->3851 3845->3844 3846 140c955-140c957 3845->3846 3848 140c959-140c963 3846->3848 3849 140c97a-140c97d 3846->3849 3852 140c965 3848->3852 3853 140c967-140c976 3848->3853 3849->3844 3857 140ca14 3850->3857 3858 140ca06-140ca0a 3850->3858 3851->3850 3852->3853 3853->3853 3855 140c978 3853->3855 3855->3849 3860 140ca15 3857->3860 3858->3857 3859 140ca0c 3858->3859 3859->3857 3860->3860
                                    APIs
                                    • LoadLibraryA.KERNELBASE(?), ref: 0140C9BA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.675700052.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_1400000_offer_doc.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 56c95dec3fbc63f2d0a6f615155ce20c4c56410e35260a6d0c9132a60cb9ffe4
                                    • Instruction ID: 8355e8b234a011b20acfa8ef0216932355270214d49c2b1e6780b48c4284af7d
                                    • Opcode Fuzzy Hash: 56c95dec3fbc63f2d0a6f615155ce20c4c56410e35260a6d0c9132a60cb9ffe4
                                    • Instruction Fuzzy Hash: EA3136B0D00249DFDB15CFAAC485BEEBBB1BB08314F14826AE815A7390D7749486CF96
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3879 66a60b4-66a6ad1 3882 66a6ad9-66a6ae3 3879->3882 3883 66a6ad3-66a6ad6 3879->3883 3884 66a6aef-66a6b31 RegQueryValueExW 3882->3884 3885 66a6ae5-66a6aed 3882->3885 3883->3882 3886 66a6b3a-66a6b74 3884->3886 3887 66a6b33-66a6b39 3884->3887 3885->3884 3891 66a6b7e 3886->3891 3892 66a6b76 3886->3892 3887->3886 3893 66a6b7f 3891->3893 3892->3891 3893->3893
                                    APIs
                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 066A6B21
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682188533.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66a0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: QueryValue
                                    • String ID:
                                    • API String ID: 3660427363-0
                                    • Opcode ID: 39de4475a4fe9dc41389afbdd0621565006441a49c4e4692eceb191e53f6762c
                                    • Instruction ID: e1fd00498d4aea9a2c8017a0a6dd1f3f3d656507c36e82cdb3d6955192c19b8a
                                    • Opcode Fuzzy Hash: 39de4475a4fe9dc41389afbdd0621565006441a49c4e4692eceb191e53f6762c
                                    • Instruction Fuzzy Hash: E931CFB1D003589FCB10CF99C884A9EBBF5BF48714F59812AE819AB354D7709915CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682188533.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66a0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: e8d7ee64bcbba4b543c0389684ff1c0d94b5bcd40f6efae6e7d68cfc4510029c
                                    • Instruction ID: f1a7f0044f6af1d83c293124cae95127213978a5cd8da5c2938af8a54da7c881
                                    • Opcode Fuzzy Hash: e8d7ee64bcbba4b543c0389684ff1c0d94b5bcd40f6efae6e7d68cfc4510029c
                                    • Instruction Fuzzy Hash: 3F317A30A01349DFCB19DFA4D9996ADBBB2EF81304F14846AD040DB3A6DB359C46CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 066A6864
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682188533.00000000066A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66a0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: Open
                                    • String ID:
                                    • API String ID: 71445658-0
                                    • Opcode ID: 8224d4c2570042a6545c14e8f1c67a8a4a266b0beb858164fd921494f5231680
                                    • Instruction ID: 3ffa0eddfc796e2ffbb176732ac08ca281946766ef4db023c77189b17942b37a
                                    • Opcode Fuzzy Hash: 8224d4c2570042a6545c14e8f1c67a8a4a266b0beb858164fd921494f5231680
                                    • Instruction Fuzzy Hash: E031EDB0D013899FDB04CF99C584A8EFBF5AF49304F29816AE809AB341C7759985CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RtlEncodePointer.NTDLL(00000000), ref: 01404FED
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.675700052.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_1400000_offer_doc.jbxd
                                    Similarity
                                    • API ID: EncodePointer
                                    • String ID:
                                    • API String ID: 2118026453-0
                                    • Opcode ID: 3a27324dbc9a1cb39826cb6604eb6fb51d5a806f7925cb068a6b9a1c7509f7e8
                                    • Instruction ID: 92880a8ea08e2dd590dce2ee23341ab7cca9f96431aeb5f67a022a982da43ad2
                                    • Opcode Fuzzy Hash: 3a27324dbc9a1cb39826cb6604eb6fb51d5a806f7925cb068a6b9a1c7509f7e8
                                    • Instruction Fuzzy Hash: D5219A708113058FDB11DF5AE04D39EBFF0EF05324F14842EE504A62A1DB7994458FA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RtlEncodePointer.NTDLL(00000000), ref: 01404D42
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.675700052.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_1400000_offer_doc.jbxd
                                    Similarity
                                    • API ID: EncodePointer
                                    • String ID:
                                    • API String ID: 2118026453-0
                                    • Opcode ID: 7d4414c12de93f006dd3d0c12b196886a46d0b48dff9e642fcd1f550196e0ad5
                                    • Instruction ID: c7f2865f78614d1efd295d4cfa4a6e41b1c52b76a93efa56e2c3e65508164c9d
                                    • Opcode Fuzzy Hash: 7d4414c12de93f006dd3d0c12b196886a46d0b48dff9e642fcd1f550196e0ad5
                                    • Instruction Fuzzy Hash: 4621CAB18013448FDB11DFA9D51879EBFF0EF49324F28806AD405A76A1D7385406CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RtlEncodePointer.NTDLL(00000000), ref: 01404D42
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.675700052.0000000001400000.00000040.00000800.00020000.00000000.sdmp, Offset: 01400000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_1400000_offer_doc.jbxd
                                    Similarity
                                    • API ID: EncodePointer
                                    • String ID:
                                    • API String ID: 2118026453-0
                                    • Opcode ID: 406c0fe0e3cad0b232d75290440da750196617608ca18137a02d84c1200de3f9
                                    • Instruction ID: c23ac853a0fb773acd3e000edff1c56f06b75f95afa1e34678a192259c73d46e
                                    • Opcode Fuzzy Hash: 406c0fe0e3cad0b232d75290440da750196617608ca18137a02d84c1200de3f9
                                    • Instruction Fuzzy Hash: CA119A719013458FDB10DFAAD408B9EBFF4EF89324F24802AE505A77A0DB796445CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 066F48FA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 058bda8418da89957da3d23f05a4c81d633c80fc7a45b80b8c7a871f07238a45
                                    • Instruction ID: 35e3ad9e98df4554eccfcaf18e9bea2d8afdc54166ae8e8ea14b0b04ea08f5f4
                                    • Opcode Fuzzy Hash: 058bda8418da89957da3d23f05a4c81d633c80fc7a45b80b8c7a871f07238a45
                                    • Instruction Fuzzy Hash: 461130B2D002499FCB10CF9AD444ADEFBF4EB88324F14842AD929A7700C375A945CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 066F48FA
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: 07ede74655899ad068dd633821ed40fe18331d813f70e9fa5fa25214575ef974
                                    • Instruction ID: 62a9c33f18443da26070a7c7f8a771493106045c3f0d39cac5747b327ac9c06d
                                    • Opcode Fuzzy Hash: 07ede74655899ad068dd633821ed40fe18331d813f70e9fa5fa25214575ef974
                                    • Instruction Fuzzy Hash: A11112B6D002499FDB10CF9AD444ADEFBF4EB88324F14842AD525A7700C775A945CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 066F468E
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: e8a889c7b2c98a1d8fcd6581cd17b7fee169c2a9db8343ffcc9aa467046c19aa
                                    • Instruction ID: ba25946d8a63de01b08b71f5314aa3e62d492057e28d5432c072fd825b950361
                                    • Opcode Fuzzy Hash: e8a889c7b2c98a1d8fcd6581cd17b7fee169c2a9db8343ffcc9aa467046c19aa
                                    • Instruction Fuzzy Hash: D61120B1C002498FDB10CF9AC844BDFFBF4EF88224F10841AE919A7600C775A945CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 066FAC25
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 1ad5409c40df69e85d8b2f258d0f5d441072bf3be66cb9b419c60c4e5faec024
                                    • Instruction ID: c31801222af0dd884fcd602f377a7f32c6ac0c8431bf46b88b00df1284a5c797
                                    • Opcode Fuzzy Hash: 1ad5409c40df69e85d8b2f258d0f5d441072bf3be66cb9b419c60c4e5faec024
                                    • Instruction Fuzzy Hash: 821103B1900249CFDB50DF99D484BDEFBF4EB49224F148519D519B7700C374A944CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 066FAC25
                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682236032.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_66f0000_offer_doc.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: d8583a8523d786ddea6dcb22259760d40abe9972a057f2d20d3262ae8b37ae8e
                                    • Instruction ID: 19d52b14b9cd2576d4ed711fbabc7a76c6c12af520eaab61720bf01fbf03c621
                                    • Opcode Fuzzy Hash: d8583a8523d786ddea6dcb22259760d40abe9972a057f2d20d3262ae8b37ae8e
                                    • Instruction Fuzzy Hash: 1D1112B18002498FDB50DF9AD589BDEFBF8EB88324F248419D559B7700C378A944CFA5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.674277845.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_100d000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6346e808d32bab65d318039e8e6fb3ee6ffc517bb6d8477fd5108f08faaa9f84
                                    • Instruction ID: 51081b89b3a89442294bdbb9fbbde9f97a38f6ea80ef7ae22c8bc36c2609e933
                                    • Opcode Fuzzy Hash: 6346e808d32bab65d318039e8e6fb3ee6ffc517bb6d8477fd5108f08faaa9f84
                                    • Instruction Fuzzy Hash: 7C42C7B284A3C19FD3474FB488112917FB1EF67225F1A41EAC081CA5A3E26D4D5ACB66
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae6b387fd6e72cc9180bfba43e6e5905d47a8cc35d97c99a9623b91d91ca5005
                                    • Instruction ID: ed10c3725f053c09ee148523071defb986dee9513a12d9842c9d006c0dd89f21
                                    • Opcode Fuzzy Hash: ae6b387fd6e72cc9180bfba43e6e5905d47a8cc35d97c99a9623b91d91ca5005
                                    • Instruction Fuzzy Hash: 7A429E30E006048FDBA4DB68C4A5AADB7B2FF86314F148869E409DB761DB39DC49CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: df43a99b9b8047fd9c5e8929798478d282a1e17e57b7b89e604f7f87e13ec65f
                                    • Instruction ID: 1bef91809973a86da1cc8763a19a8a5b4a3f29fac38435db4a967b49fb859189
                                    • Opcode Fuzzy Hash: df43a99b9b8047fd9c5e8929798478d282a1e17e57b7b89e604f7f87e13ec65f
                                    • Instruction Fuzzy Hash: F7129231B142048FDB65DB78D8446AE7BF2AF89325F15846AE405DB361DF38DC09CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9a1a85f9b103f0383428b78b095a09d48a1ca9a17eaca571c510a07e6479c37d
                                    • Instruction ID: 17bb4e1f0e7f7371a7fd3ddbecca61444a5e4be506d69569bdf1e0808d06d4bf
                                    • Opcode Fuzzy Hash: 9a1a85f9b103f0383428b78b095a09d48a1ca9a17eaca571c510a07e6479c37d
                                    • Instruction Fuzzy Hash: 2D029C31B002098FDB55DBB4D858AADB7F2AF85305F148429E50ADB3A5DF38DD0ACB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 973a58cf2b419bdc15eb2079a4445ed272d7f19908b1b848988afa334b913f86
                                    • Instruction ID: 15a319e64802b9349fdc96fac97c045e6b4f4fed91297336be78f656f7c82ac0
                                    • Opcode Fuzzy Hash: 973a58cf2b419bdc15eb2079a4445ed272d7f19908b1b848988afa334b913f86
                                    • Instruction Fuzzy Hash: 92E15930A00604CFC764DB64D4A9A9DBBF2EF85319F14886DE41A9B761DB39DC4ACF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e799f5f89c3a5056cc0427e20fc7a43894d80e50b421cc7d631d9f1655acb3a1
                                    • Instruction ID: d97b1707faf5afb35cd32bef866637cbe21bbec50410cdfcb88778859c344888
                                    • Opcode Fuzzy Hash: e799f5f89c3a5056cc0427e20fc7a43894d80e50b421cc7d631d9f1655acb3a1
                                    • Instruction Fuzzy Hash: A3D13C30E111099FEBB0DB68D4887ADB7E2EB45314F548876E409DB3A1DB38DD89CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: adba6553c8c388c9af0082514568c3e80f7504d08a24ab7e683568df6fa54fd8
                                    • Instruction ID: fe3c7009933aaa96104967f3639a447d58bdc2618ba784fc9f1fbbd09a95bfb5
                                    • Opcode Fuzzy Hash: adba6553c8c388c9af0082514568c3e80f7504d08a24ab7e683568df6fa54fd8
                                    • Instruction Fuzzy Hash: ED919E30B042098FDB54EFB5D8996AD77F2EF84209B14882DE506DB764DF349D0ACB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e5861253c1a6eb9cfc70e7488223836ed3a55b31d6b99ee788e876e8e00da333
                                    • Instruction ID: 7c92cea2eb6f8ae941b6ff2cde999163e4019b0d6601e051650bc4382fdf892a
                                    • Opcode Fuzzy Hash: e5861253c1a6eb9cfc70e7488223836ed3a55b31d6b99ee788e876e8e00da333
                                    • Instruction Fuzzy Hash: 1871A030B053058FDB54EB75D89866E77E2AFC4209F148839E402DB7A4DF39D90ACB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2338c40a73a6205773c5a7ace9d0d477ed3fbe0b0cbac94b896476ec1edbfe5e
                                    • Instruction ID: 7a2ecd129e058c4d32d0fabc2aabd0922cbda9b2aaa6391972251852ef7b202a
                                    • Opcode Fuzzy Hash: 2338c40a73a6205773c5a7ace9d0d477ed3fbe0b0cbac94b896476ec1edbfe5e
                                    • Instruction Fuzzy Hash: 8771F430E002048BDB60CF69D8857ADFBF6AFC5304F24C1AAD50A9B795DB79C849CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5ff1bf1e20b0786197b905de55a5bc59f5b0b10da4d7846e3cc0d749a916a610
                                    • Instruction ID: 65883503ee173f5cc5ef1115c776cca7f8b48a736f9f2275421e5977c01de62d
                                    • Opcode Fuzzy Hash: 5ff1bf1e20b0786197b905de55a5bc59f5b0b10da4d7846e3cc0d749a916a610
                                    • Instruction Fuzzy Hash: 6C71E530B013098FCB54EBB9D494AAE7BF2BF89205B148579D005E7765EF38DC068B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bee751447cb798f43090607414f81787b3543bc5f5c1b989e8920118398fc9aa
                                    • Instruction ID: e088efc152d2a170a705142afdc56b29740a3fa62fdf6c39d68fb0979980a6be
                                    • Opcode Fuzzy Hash: bee751447cb798f43090607414f81787b3543bc5f5c1b989e8920118398fc9aa
                                    • Instruction Fuzzy Hash: E661D331B0D3858FD7529B78982876A7FF69FA2204F1980B7D185CB397E638CC0A8751
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4cadfd97085cb84ded29a18bbb066d1fc1d1df4427b8951cae8eb849997d8e34
                                    • Instruction ID: c8c4ce8cc241934d437dc70716d92237cda379a8b248adc1f399462876d4098f
                                    • Opcode Fuzzy Hash: 4cadfd97085cb84ded29a18bbb066d1fc1d1df4427b8951cae8eb849997d8e34
                                    • Instruction Fuzzy Hash: C851FD30F082448FD7614729D94576ABBBA8BD2344F28C1F6D109CFB96D67EC84B8392
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 47bff12c8cebd72e82275aae602aa1535fc383681ee438beb19dc8ddf3905c97
                                    • Instruction ID: 21a2c341065472f500645b2a2df1133dc40d58f94f8117f1e16a6ee84974c38c
                                    • Opcode Fuzzy Hash: 47bff12c8cebd72e82275aae602aa1535fc383681ee438beb19dc8ddf3905c97
                                    • Instruction Fuzzy Hash: 4141E432B083448FD781D77DC855A6E7BF6DF99204F158076E108DB396DA38DD068791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4b5407cf68c6bb9c458bb5eb786e5c88ffa538df63e89a0ac611027a4a8f764f
                                    • Instruction ID: 4677747f477f54919e122b8a7ed6991c26d8dcac8d7118c10da78150777f8747
                                    • Opcode Fuzzy Hash: 4b5407cf68c6bb9c458bb5eb786e5c88ffa538df63e89a0ac611027a4a8f764f
                                    • Instruction Fuzzy Hash: D741D335B043088FCB55A779886866E77E3EF89304B508579E50ADB3A5DF38DC0A87D2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5880a66d9b72bbd673bb565415b21ac4add72e6bd6e95a54616a29603f32de1c
                                    • Instruction ID: 779ce7c4d0460f3058c8109b57a8fc435a8e4f919b273cd74b0501bb133d63d1
                                    • Opcode Fuzzy Hash: 5880a66d9b72bbd673bb565415b21ac4add72e6bd6e95a54616a29603f32de1c
                                    • Instruction Fuzzy Hash: 8651FD79E00208DFCB81EFA4E5959CDBBB2FF88305B518926D411A7728DB34AD46CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0c1ae5afea0c43899ad5b2867cd17dfc500c3e392dcd4aeebc47526aa193f7f7
                                    • Instruction ID: 7b900623a96d9af2bffe7e63b07f8a29174f8abcff894ad3989a92cefb677129
                                    • Opcode Fuzzy Hash: 0c1ae5afea0c43899ad5b2867cd17dfc500c3e392dcd4aeebc47526aa193f7f7
                                    • Instruction Fuzzy Hash: 9251FD79E00208DFCB81EFA4E5959CDBBB2FF88306B514926D411A7728DB34AD46CF91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 36315942e00520c72aa325b1fe1f5280da0bccd161c2bf0dcc76420567a68234
                                    • Instruction ID: 4f147d03efaf413b3aab0b4b480feb39ef69e61c287dce97c3732e7c9fcb8955
                                    • Opcode Fuzzy Hash: 36315942e00520c72aa325b1fe1f5280da0bccd161c2bf0dcc76420567a68234
                                    • Instruction Fuzzy Hash: BC41BFB1F002044BDB64DBA9C8857AEBAE2FF89354F54853DD40AEB754CA38D8068791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9009e82b03f31d2817df4f05bb9d49fbc4a4cffc286f77c26042708f980c40c7
                                    • Instruction ID: ba75c62e18732e8f7811aa24306c51cea952d30c23fb9d88fc8325e2bc83a1ef
                                    • Opcode Fuzzy Hash: 9009e82b03f31d2817df4f05bb9d49fbc4a4cffc286f77c26042708f980c40c7
                                    • Instruction Fuzzy Hash: A531F231F002058FDB68AB74C5586AEB7E6EF88219B144829E402EB354DF38DD4ACBD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 87953dfa86102a063aa95d12adf8d42c8af03380bae4add1b062b1ba1be8439e
                                    • Instruction ID: d4d2fea38cdb8601e11c7426efe47ed433d21619425439ef100283fb177545f9
                                    • Opcode Fuzzy Hash: 87953dfa86102a063aa95d12adf8d42c8af03380bae4add1b062b1ba1be8439e
                                    • Instruction Fuzzy Hash: 1F31D230F002048FDB68AB74C554AAEB7E6EF88255B144829E006DB354DF39DC46CBD2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5beb3533f7757dbce7270ab248e6b2c23c5478de8495da295ad45a66414d5d2d
                                    • Instruction ID: 004762aad53965935c0ef774294e61bee60a2e3bfcd1740a13da40c0b692e3e8
                                    • Opcode Fuzzy Hash: 5beb3533f7757dbce7270ab248e6b2c23c5478de8495da295ad45a66414d5d2d
                                    • Instruction Fuzzy Hash: 3D21D631F006088FC7D0EB79DC56AAE77F2EB89205F14806AE109D7355EB38AD0687D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c611aa6367bbf10e0b7e725fa6e787ab029d82c94172e834ec9935137888091e
                                    • Instruction ID: a4ef74394b49d5af42fe2ab1fffebdc4b615e6e73356529e050dab08e294ca43
                                    • Opcode Fuzzy Hash: c611aa6367bbf10e0b7e725fa6e787ab029d82c94172e834ec9935137888091e
                                    • Instruction Fuzzy Hash: 4221E431F042154FCB90EB78CC55A6E77F6EB89214B14846AD508E7395EA38AC0687D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 25c80a647b360b05a4169da6fef80075d7cf5a3b90903c336fdeaf2cc9ad1ce7
                                    • Instruction ID: 7a93274466c06dfdff1612cd1b062d5f50a652e4122134458d26e9a9ecdfe1e4
                                    • Opcode Fuzzy Hash: 25c80a647b360b05a4169da6fef80075d7cf5a3b90903c336fdeaf2cc9ad1ce7
                                    • Instruction Fuzzy Hash: A721B431B042048FCB90EB79DC55AAE77F6EFC9201B54846AE118D7355EB389D0A87D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b97a9247f198f32e3e08fd60e3ebcdb45326a30c47aa09dbe29436615c369847
                                    • Instruction ID: 8d3eb02b955a0efb12cba52d832ed12b74082934a65730d3c1abbe5fa39c0e2b
                                    • Opcode Fuzzy Hash: b97a9247f198f32e3e08fd60e3ebcdb45326a30c47aa09dbe29436615c369847
                                    • Instruction Fuzzy Hash: 1021BF70E052099FCB54CFA9D884A9EBBF6EB88314F14807AE508D7342E734E946CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.674277845.000000000100D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0100D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_100d000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9258ad9a869c84451fac0681b4cf033f63f7d8dd1a33d601525d7b17b295550f
                                    • Instruction ID: bc5c3bf66daad75d1dca0b06598db510acc2f87fda110a0456bd3aa0a1ef7e55
                                    • Opcode Fuzzy Hash: 9258ad9a869c84451fac0681b4cf033f63f7d8dd1a33d601525d7b17b295550f
                                    • Instruction Fuzzy Hash: 4F214C71504200DFEB06CF14D5C4B26BBA5FB88324F24C9BDD9895B297C736D846CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd5ea4298ea713800cbcc98135443b1f71d16c19f1c93a343da6da7cb894c221
                                    • Instruction ID: 32b1c3c4906c2dff0b1d2f4a04ed8b048ca896ae7372cade6868d0293f6ffa6b
                                    • Opcode Fuzzy Hash: fd5ea4298ea713800cbcc98135443b1f71d16c19f1c93a343da6da7cb894c221
                                    • Instruction Fuzzy Hash: A5116034E142048FCB20DB68D480AAE77F5EF89214F0144A6D985DB361EB34ED09CBD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ed139f5a528a109c2eba24b6ae5617709a4102e2799f4bc8d4dd398683cb203f
                                    • Instruction ID: 50a8e9e70e4a045572373dae22683e906293552113051069b857d0c2eac71bf0
                                    • Opcode Fuzzy Hash: ed139f5a528a109c2eba24b6ae5617709a4102e2799f4bc8d4dd398683cb203f
                                    • Instruction Fuzzy Hash: 2111B23170D3815FD7069729C819756BFB69BA2204F19C4BBD084CB7A3DA3DCC0A8B11
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b120f314e9a346651603bc223cc5b43f930c921851ca9e1246e56ca1231fc82b
                                    • Instruction ID: 5c096de073c882e2c66765c870a34d7b2f2ebef1ff608fd8ef2fb18e1e038c85
                                    • Opcode Fuzzy Hash: b120f314e9a346651603bc223cc5b43f930c921851ca9e1246e56ca1231fc82b
                                    • Instruction Fuzzy Hash: C3111C34F141058FCB60DB69D480AAEB3F5EF89224F1144A6E946DB350EB34ED05CBD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e1987bed4a515ee94a64d0fcd03dfc2e8d8e62ea87927fdcb61b4adc617d0b3f
                                    • Instruction ID: 5c3536063133454f034621345735c820f23aa01be257efc3b87f4c00bb319566
                                    • Opcode Fuzzy Hash: e1987bed4a515ee94a64d0fcd03dfc2e8d8e62ea87927fdcb61b4adc617d0b3f
                                    • Instruction Fuzzy Hash: 83113031B006188F8B90EB79D8569AE77F6BF892157504429D509E7314EB389D028BD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6b0aafae5a5438ba42ae01a8253fd02335dc136ebb3c4e6ae607cd25042c98b8
                                    • Instruction ID: 06ffc2981c93fbc3ee57b8cff45001f16957c5b67b5927b2bf1623e9bb0fd33a
                                    • Opcode Fuzzy Hash: 6b0aafae5a5438ba42ae01a8253fd02335dc136ebb3c4e6ae607cd25042c98b8
                                    • Instruction Fuzzy Hash: E9113035B002148F8B90EBB8D8559AE77F6FF8D2157508429D509E7318EB389D028BD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cf3ea05499d5f45a7cdabfb976127f02a17c948ebc8388c4a6a4be578b9897ba
                                    • Instruction ID: d7e0f3a1379032012c57159f1149ede459cbfed8f12f29b07ab8a52d70f20588
                                    • Opcode Fuzzy Hash: cf3ea05499d5f45a7cdabfb976127f02a17c948ebc8388c4a6a4be578b9897ba
                                    • Instruction Fuzzy Hash: C2117C31F002188F8B94EFB8D8559AE77F6FF882117508429D119E7354EB38AD018BE1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 687dfa46d89d6aad70a83498c24409d6b880e6275087d8059cab3e99c58b039c
                                    • Instruction ID: 8b7fa59ef29cfd2b0f327e90f2ee7b38e5dcaaefa1a845d95cf6d353c42af413
                                    • Opcode Fuzzy Hash: 687dfa46d89d6aad70a83498c24409d6b880e6275087d8059cab3e99c58b039c
                                    • Instruction Fuzzy Hash: 12117931B002188F8BD0EBB8D8959AE77F2FF882117508429D109E3354EB38AD068BE1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5f10e31ca1f794abae012c748023cf5d5dad36a04ddada9066928c5fe3e5bc86
                                    • Instruction ID: e9fba09b7c09266bc16ba7ed3473225d3b14e8f634a33827180a6ae79883c1bc
                                    • Opcode Fuzzy Hash: 5f10e31ca1f794abae012c748023cf5d5dad36a04ddada9066928c5fe3e5bc86
                                    • Instruction Fuzzy Hash: CB117C31B002198F8BD0EF78D8569AE77F2FF892157508429D109E3314EB38AD068BD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8b03e6d6bbef8a8c8cc499c4884d93a7139713d8b2225927c318e4656af1cb6b
                                    • Instruction ID: 932ee1b410abb42fca9c7d6087dcc4927c338a112ec3f8714ab85a3ad3f94e78
                                    • Opcode Fuzzy Hash: 8b03e6d6bbef8a8c8cc499c4884d93a7139713d8b2225927c318e4656af1cb6b
                                    • Instruction Fuzzy Hash: 27F03775F002289F8F90EBB958146DF7AF9DF88260F140575D519E3754EE389D018BD2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4eadf510866f00cfb49141cdcc4ef7977c5bab575347347311664be79a0810a8
                                    • Instruction ID: a1d198ebf3ffdf03c9e30143c53eed06a2acb421ba5dc560e2b49f6d40690fcd
                                    • Opcode Fuzzy Hash: 4eadf510866f00cfb49141cdcc4ef7977c5bab575347347311664be79a0810a8
                                    • Instruction Fuzzy Hash: 3BE0E5B2E002199F8B90DABCAC092EE7BFCDB88161B400136E919E3300EA758A0587D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 97106c56b43892b8a1febfd79d429debd824a0fece6139d272c7f237f7742eb7
                                    • Instruction ID: 2144998192980cbac80f479c47ddd4a5aaeabf7bb42df8d38cd2a31859dc5572
                                    • Opcode Fuzzy Hash: 97106c56b43892b8a1febfd79d429debd824a0fece6139d272c7f237f7742eb7
                                    • Instruction Fuzzy Hash: C2E0C035B141188B8B54EBB8D4498DDB7F2FBC82267004069E54AE3754DE349D058B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4a277afc5438b5853ca35646be408de0097e6104dcfac0c9f4f0c9e1e9c53c16
                                    • Instruction ID: 9effe928bb32e05ab4f326b99433015acc990d1761ce3840730fe9c0ea84cfee
                                    • Opcode Fuzzy Hash: 4a277afc5438b5853ca35646be408de0097e6104dcfac0c9f4f0c9e1e9c53c16
                                    • Instruction Fuzzy Hash: E6E0ED35F005189B8F94EBB8D8958DD73F2AFCD116B004066E519E7354EE289D0287E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a2c592ea02fedf46bd46da96986a2b212e2df841123f653464b3f866f395290f
                                    • Instruction ID: 541cd560f97092913816173064470d991820f56322eeb9701a87643941e7cdd3
                                    • Opcode Fuzzy Hash: a2c592ea02fedf46bd46da96986a2b212e2df841123f653464b3f866f395290f
                                    • Instruction Fuzzy Hash: 1FE0E535F005144B8F94F7B8D8558DD73F1BFC91167004066D555E7354DE285D0187E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 043867d46510062910e8f52f89e070c5b3775b388a059caa62edaddc6e18557d
                                    • Instruction ID: b33fdac48b58521f053681040189032869a085e5992488318c44ca9395f78513
                                    • Opcode Fuzzy Hash: 043867d46510062910e8f52f89e070c5b3775b388a059caa62edaddc6e18557d
                                    • Instruction Fuzzy Hash: EBE0E536F001144B9F94E7B8D4558DD73F1AFC81167004066D515E7354EE285D0187E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 088f2a9ce30f1369e52de033414c07bc8a4192bce22d0f52bf860c63aef5a2d7
                                    • Instruction ID: 32c88951ac98a3df2aac7ff2c749ba066718e124196d688167faf63c5ebf5499
                                    • Opcode Fuzzy Hash: 088f2a9ce30f1369e52de033414c07bc8a4192bce22d0f52bf860c63aef5a2d7
                                    • Instruction Fuzzy Hash: 8AE0ED36F001188B8F94FBB8D8958DD73F1BFC81267044466D559E7364EE289D0187E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 36f9492f7665839d744eb7746c7b4d8c7013541fc356657002952f4e902a4d37
                                    • Instruction ID: 9827e36c9d13daa3a5b6caee17af844a92f5a24992db19463c8e77598afa1b13
                                    • Opcode Fuzzy Hash: 36f9492f7665839d744eb7746c7b4d8c7013541fc356657002952f4e902a4d37
                                    • Instruction Fuzzy Hash: F7E0ED35F001189B8F94EBB8D8958DD73F2AFC82167004066D519E7354EE289D0287E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8846723d253790cdff1f1aedc59879f2fbd327600a9db24250e10d836442cd6
                                    • Instruction ID: 5edf362898686a8b13348885bdf831519cf0851abb08b43741239523cc1d61ec
                                    • Opcode Fuzzy Hash: f8846723d253790cdff1f1aedc59879f2fbd327600a9db24250e10d836442cd6
                                    • Instruction Fuzzy Hash: 0AE0ED35F001188B8FD4EBB8D8958DD73F2AFC91267004066E519E7354EE289D0287E1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c96cd1016b656a0bcff242d8f42f46b26310d6e72ca65cf4b1c66df36bb9606f
                                    • Instruction ID: 620ed2533548edb06e26a98b13a12ecaac63a2923608ea71a1e36e1f3b555212
                                    • Opcode Fuzzy Hash: c96cd1016b656a0bcff242d8f42f46b26310d6e72ca65cf4b1c66df36bb9606f
                                    • Instruction Fuzzy Hash: 19E01271E041199F4B50DBBDA8055AE7FF8EA8C261B104576E509E3204EA758A058BE1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 71c5b27a0ff90edcfda2d75247412c6b77fb0f58088c7b47a64b0a323661f0a3
                                    • Instruction ID: c087a9eefbf95dc9fd71a660efc6f79960af651a049a89cb1ec0cebd4486cc4e
                                    • Opcode Fuzzy Hash: 71c5b27a0ff90edcfda2d75247412c6b77fb0f58088c7b47a64b0a323661f0a3
                                    • Instruction Fuzzy Hash: B2E06D35F005188F8F90EBB8E8958DDB3F2AFC81167008066D50AE7354EE389C018BE1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f8feffca62cd2157d7cfec3e1244c966800fcf398f69545aa0e4d308ba71394d
                                    • Instruction ID: e8cc9f6587deb83321531391ea4b63d787a618e8c049021bb99222f85834d81c
                                    • Opcode Fuzzy Hash: f8feffca62cd2157d7cfec3e1244c966800fcf398f69545aa0e4d308ba71394d
                                    • Instruction Fuzzy Hash: 85E0C27295C3484FDB216660F88932A3B96C782209F15083DD046C5351E91FC8449382
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000003.00000002.682079733.0000000006370000.00000040.00000800.00020000.00000000.sdmp, Offset: 06370000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_3_2_6370000_offer_doc.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f9e5bd43d2f487278a189e65a3741256f6c5fc2b22e58714d626964e4710198
                                    • Instruction ID: b4b3ed92d4ad507480599fa7299b41afde7f82b1c65e9f6477f5c3aa66785aa7
                                    • Opcode Fuzzy Hash: 8f9e5bd43d2f487278a189e65a3741256f6c5fc2b22e58714d626964e4710198
                                    • Instruction Fuzzy Hash: BAD01231A282148BDB756A74F44D36D339AD746315F600C39E40ACA340EE2BD894E7C1
                                    Uniqueness

                                    Uniqueness Score: -1.00%