Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Request for Quotations and specifications.pdf.exe

Overview

General Information

Sample name:Request for Quotations and specifications.pdf.exe
Analysis ID:1573553
MD5:a27b87004e36c99c5ae138960f632287
SHA1:b85c27e89d6eaf68a8cbc0d683546d46b8d270f6
SHA256:31ee50c565b3d2bc907ce74e87ed30d9a282bcdd99995fce3924adb7d7028cb8
Tags:exeMassLoggerQuotationuser-cocaman
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Request for Quotations and specifications.pdf.exe (PID: 6764 cmdline: "C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe" MD5: A27B87004E36C99C5AE138960F632287)
    • holy.exe (PID: 3032 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe" MD5: F072A1E438C9D2453EE1B74027D07DD2)
      • RegAsm.exe (PID: 2156 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • Acrobat.exe (PID: 4080 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\img.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 6540 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 4280 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2056 --field-trial-handle=1664,i,10022418553164981674,7923153825484368479,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "8030768790:AAFwJTXJb6rGHC9gtdsn8NQ4WDL395xAhlE", "Telegram Chatid": "698123469"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xfc0d:$a1: get_encryptedPassword
        • 0xff35:$a2: get_encryptedUsername
        • 0xf99a:$a3: get_timePasswordChanged
        • 0xfabb:$a4: get_passwordField
        • 0xfc23:$a5: set_encryptedPassword
        • 0x11581:$a7: get_logins
        • 0x11232:$a8: GetOutlookPasswords
        • 0x11024:$a9: StartKeylogger
        • 0x114d1:$a10: KeyLoggerEventArgs
        • 0x11081:$a11: KeyLoggerEventArgsEventHandler
        00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 17 entries
          SourceRuleDescriptionAuthorStrings
          3.2.RegAsm.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            3.2.RegAsm.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              3.2.RegAsm.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                3.2.RegAsm.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf75d:$a1: get_encryptedPassword
                • 0xfa85:$a2: get_encryptedUsername
                • 0xf4ea:$a3: get_timePasswordChanged
                • 0xf60b:$a4: get_passwordField
                • 0xf773:$a5: set_encryptedPassword
                • 0x110d1:$a7: get_logins
                • 0x10d82:$a8: GetOutlookPasswords
                • 0x10b74:$a9: StartKeylogger
                • 0x11021:$a10: KeyLoggerEventArgs
                • 0x10bd1:$a11: KeyLoggerEventArgsEventHandler
                3.2.RegAsm.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x148ad:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x13dab:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x140b9:$a4: \Orbitum\User Data\Default\Login Data
                • 0x14eb1:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe", CommandLine: "C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe", CommandLine|base64offset|contains: ~, Image: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe, NewProcessName: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe, OriginalFileName: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe", ProcessId: 6764, ProcessName: Request for Quotations and specifications.pdf.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-12T09:02:13.293315+010028032742Potentially Bad Traffic192.168.2.849704193.122.6.16880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeAvira: detection malicious, Label: HEUR/AGEN.1306767
                Source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "8030768790:AAFwJTXJb6rGHC9gtdsn8NQ4WDL395xAhlE", "Telegram Chatid": "698123469"}
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeVirustotal: Detection: 45%Perma Link
                Source: Request for Quotations and specifications.pdf.exeVirustotal: Detection: 44%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeJoe Sandbox ML: detected
                Source: Request for Quotations and specifications.pdf.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.8:49705 version: TLS 1.0
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Runpe\WindowsFormsApp1\WindowsFormsApp1\obj\Debug\Piver.pdb source: holy.exe, 00000002.00000002.1449424584.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1451805107.00000000051C0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: Request for Quotations and specifications.pdf.exe
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Runpe\WindowsFormsApp1\WindowsFormsApp1\obj\Debug\Piver.pdb_JyJ kJ_CorDllMainmscoree.dll source: holy.exe, 00000002.00000002.1449424584.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1451805107.00000000051C0000.00000004.08000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C6B190 SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF663C6B190
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C540BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF663C540BC
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C7FCA0 FindFirstFileExA,0_2_00007FF663C7FCA0
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeCode function: 4x nop then jmp 02B50DD9h2_2_02B50B98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 01735782h3_2_01735358
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 017351B9h3_2_01734F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 01735782h3_2_01735367
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 01735782h3_2_017356AF
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.175 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.8:49704 -> 193.122.6.168:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.8:49705 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.175 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
                Source: RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2694976808.000000000333E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegAsm.exe, 00000003.00000002.2694976808.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: holy.exe, 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: 77EC63BDA74BD0D0E0426DC8F80085060.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: RegAsm.exe, 00000003.00000002.2694976808.000000000336D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegAsm.exe, 00000003.00000002.2694976808.000000000336D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegAsm.exe, 00000003.00000002.2694976808.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: 2D85F72862B55C4EADD9E66E06947F3D.5.drString found in binary or memory: http://x1.i.lencr.org/
                Source: holy.exe, 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: holy.exe, 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.175d
                Source: RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.175l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 2.2.holy.exe.3d60e80.4.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: holy.exe PID: 3032, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegAsm.exe PID: 2156, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: initial sampleStatic PE information: Filename: Request for Quotations and specifications.pdf.exe
                Source: initial sampleStatic PE information: Filename: Request for Quotations and specifications.pdf.exe
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C4C2F0: CreateFileW,CloseHandle,wcscpy,wcscpy,wcscpy,wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF663C4C2F0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C634840_2_00007FF663C63484
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C5A4AC0_2_00007FF663C5A4AC
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C6B1900_2_00007FF663C6B190
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C549280_2_00007FF663C54928
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C4F9300_2_00007FF663C4F930
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C707540_2_00007FF663C70754
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C61F200_2_00007FF663C61F20
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C6CE880_2_00007FF663C6CE88
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C45E240_2_00007FF663C45E24
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C5B5340_2_00007FF663C5B534
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C653F00_2_00007FF663C653F0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C4A3100_2_00007FF663C4A310
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C4C2F00_2_00007FF663C4C2F0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C472880_2_00007FF663C47288
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C5126C0_2_00007FF663C5126C
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C621D00_2_00007FF663C621D0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C5F1800_2_00007FF663C5F180
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C7C8380_2_00007FF663C7C838
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C448400_2_00007FF663C44840
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C476C00_2_00007FF663C476C0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C825500_2_00007FF663C82550
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C78C1C0_2_00007FF663C78C1C
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C5BB900_2_00007FF663C5BB90
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C64B980_2_00007FF663C64B98
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C55B600_2_00007FF663C55B60
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C85AF80_2_00007FF663C85AF8
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C7FA940_2_00007FF663C7FA94
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C62AB00_2_00007FF663C62AB0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C41AA40_2_00007FF663C41AA4
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C51A480_2_00007FF663C51A48
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C789A00_2_00007FF663C789A0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C5C96C0_2_00007FF663C5C96C
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C639640_2_00007FF663C63964
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C820800_2_00007FF663C82080
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C5AF180_2_00007FF663C5AF18
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C68DF40_2_00007FF663C68DF4
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C707540_2_00007FF663C70754
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C62D580_2_00007FF663C62D58
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeCode function: 2_2_02B532DF2_2_02B532DF
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeCode function: 2_2_02B50B982_2_02B50B98
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeCode function: 2_2_02B50B802_2_02B50B80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0173C1683_2_0173C168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0173CA583_2_0173CA58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01732DD13_2_01732DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01734F083_2_01734F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01737E683_2_01737E68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0173B9E03_2_0173B9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01737E633_2_01737E63
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01734EF83_2_01734EF8
                Source: Request for Quotations and specifications.pdf.exe, 00000000.00000002.2693047988.000001540F0CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAcrobat.exe< vs Request for Quotations and specifications.pdf.exe
                Source: Request for Quotations and specifications.pdf.exe, 00000000.00000003.1441073247.00000154131F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameconfig.exe. vs Request for Quotations and specifications.pdf.exe
                Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: holy.exe PID: 3032, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegAsm.exe PID: 2156, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: holy.exe.0.dr, NationalSymbols.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.holy.exe.3cfb200.2.raw.unpack, Foures.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.holy.exe.3d22630.3.raw.unpack, Foures.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.holy.exe.54a0000.6.raw.unpack, Foures.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.holy.exe.3d60e80.4.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.holy.exe.3d60e80.4.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/52@3/2
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C4B6D8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF663C4B6D8
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C68624 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipAlloc,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF663C68624
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\holy.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeFile read: C:\Windows\win.iniJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegAsm.exe, 00000003.00000002.2694976808.00000000033CE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2694976808.00000000033EF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2694976808.00000000033C0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2694976808.00000000033E3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2694976808.00000000033B0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2695916494.00000000042FD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Request for Quotations and specifications.pdf.exeVirustotal: Detection: 44%
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeFile read: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe "C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe"
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe"
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\img.pdf"
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2056 --field-trial-handle=1664,i,10022418553164981674,7923153825484368479,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe" Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\img.pdf"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2056 --field-trial-handle=1664,i,10022418553164981674,7923153825484368479,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: dxgidebug.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Runpe\WindowsFormsApp1\WindowsFormsApp1\obj\Debug\Piver.pdb source: holy.exe, 00000002.00000002.1449424584.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1451805107.00000000051C0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar64\Release\sfxrar.pdb source: Request for Quotations and specifications.pdf.exe
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Runpe\WindowsFormsApp1\WindowsFormsApp1\obj\Debug\Piver.pdb_JyJ kJ_CorDllMainmscoree.dll source: holy.exe, 00000002.00000002.1449424584.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1451805107.00000000051C0000.00000004.08000000.00040000.00000000.sdmp
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation

                barindex
                Source: holy.exe.0.dr, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                Source: holy.exe.0.dr, Program.cs.Net Code: LoadAndInvoke
                Source: 2.2.holy.exe.3cfb200.2.raw.unpack, Fives.cs.Net Code: FD System.AppDomain.Load(byte[])
                Source: 2.2.holy.exe.3d22630.3.raw.unpack, Fives.cs.Net Code: FD System.AppDomain.Load(byte[])
                Source: 2.2.holy.exe.54a0000.6.raw.unpack, Fives.cs.Net Code: FD System.AppDomain.Load(byte[])
                Source: holy.exe.0.drStatic PE information: 0xB7863B0E [Wed Jul 27 21:24:30 2067 UTC]
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_5238109Jump to behavior
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: section name: .didat
                Source: Request for Quotations and specifications.pdf.exeStatic PE information: section name: _RDATA
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C85166 push rsi; retf 0_2_00007FF663C85167
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C85156 push rsi; retf 0_2_00007FF663C85157
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0173F273 push ebp; retf 3_2_0173F281
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_017364F5 pushfd ; iretd 3_2_017364FA
                Source: holy.exe.0.drStatic PE information: section name: .text entropy: 7.062980207558431
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeJump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: Possible double extension: pdf.exeStatic PE information: Request for Quotations and specifications.pdf.exe
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: holy.exe PID: 3032, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory allocated: 2C80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory allocated: 4C80000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1730000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 32D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 52D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe TID: 2344Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C6B190 SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF663C6B190
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C540BC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF663C540BC
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C7FCA0 FindFirstFileExA,0_2_00007FF663C7FCA0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C716A4 VirtualQuery,GetSystemInfo,0_2_00007FF663C716A4
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegAsm.exe, 00000003.00000002.2693725364.00000000015C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0173C168 LdrInitializeThunk,LdrInitializeThunk,3_2_0173C168
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C73170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF663C73170
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C80D20 GetProcessHeap,0_2_00007FF663C80D20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C72510 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF663C72510
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C73354 SetUnhandledExceptionFilter,0_2_00007FF663C73354
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C73170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF663C73170
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C776D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF663C776D8
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: holy.exe.0.dr, SystemEvents.csReference to suspicious API methods: global::Interop.Kernel32.LoadLibrary("wtsapi32.dll")
                Source: 2.2.holy.exe.2ca6770.1.raw.unpack, Nive.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                Source: 2.2.holy.exe.3d60e80.4.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41A000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41C000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1191008Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C6B190 SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,GetDlgItem,SendMessageW,SendMessageW,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetWindowTextW,SetDlgItemTextW,SetWindowTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,SendMessageW,SendDlgItemMessageW,GetDlgItem,SendMessageW,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EnableWindow,SendMessageW,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF663C6B190
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe" Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\img.pdf"Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C858E0 cpuid 0_2_00007FF663C858E0
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF663C6A2CC
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C70754 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF663C70754
                Source: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exeCode function: 0_2_00007FF663C551A4 GetVersionExW,0_2_00007FF663C551A4
                Source: C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: holy.exe PID: 3032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2156, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: holy.exe PID: 3032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2156, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2694976808.0000000003426000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: holy.exe PID: 3032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2156, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: holy.exe PID: 3032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2156, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d22630.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3cfb200.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.holy.exe.3d60e80.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: holy.exe PID: 3032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2156, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                2
                File and Directory Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
                Process Injection
                13
                Obfuscated Files or Information
                Security Account Manager36
                System Information Discovery
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS121
                Security Software Discovery
                Distributed Component Object Model1
                Input Capture
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets1
                Process Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Masquerading
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt311
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1573553 Sample: Request for Quotations and ... Startdate: 12/12/2024 Architecture: WINDOWS Score: 100 31 reallyfreegeoip.org 2->31 33 x1.i.lencr.org 2->33 35 5 other IPs or domains 2->35 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 49 11 other signatures 2->49 9 Request for Quotations and specifications.pdf.exe 3 10 2->9         started        signatures3 47 Tries to detect the country of the analysis system (by using the IP) 31->47 process4 file5 25 C:\Users\user\AppData\Local\Temp\...\holy.exe, PE32 9->25 dropped 12 holy.exe 1 9->12         started        15 Acrobat.exe 64 9->15         started        process6 signatures7 51 Antivirus detection for dropped file 12->51 53 Multi AV Scanner detection for dropped file 12->53 55 Machine Learning detection for dropped file 12->55 57 3 other signatures 12->57 17 RegAsm.exe 15 2 12->17         started        21 AcroCEF.exe 108 15->21         started        process8 dnsIp9 27 checkip.dyndns.com 193.122.6.168, 49704, 80 ORACLE-BMC-31898US United States 17->27 29 reallyfreegeoip.org 104.21.67.152, 443, 49705 CLOUDFLARENETUS United States 17->29 37 Tries to steal Mail credentials (via file / registry access) 17->37 39 Tries to harvest and steal browser information (history, passwords, etc) 17->39 23 AcroCEF.exe 21->23         started        signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Request for Quotations and specifications.pdf.exe44%VirustotalBrowse
                Request for Quotations and specifications.pdf.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe100%AviraHEUR/AGEN.1306767
                C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe46%VirustotalBrowse
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.210.172
                truefalse
                  high
                  reallyfreegeoip.org
                  104.21.67.152
                  truefalse
                    high
                    default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
                    217.20.58.98
                    truefalse
                      high
                      checkip.dyndns.com
                      193.122.6.168
                      truefalse
                        high
                        x1.i.lencr.org
                        unknown
                        unknownfalse
                          high
                          checkip.dyndns.org
                          unknown
                          unknownfalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.org/xml/8.46.123.175false
                              high
                              http://checkip.dyndns.org/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D.5.drfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.175dRegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.comdRegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.org/qholy.exe, 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        high
                                        http://reallyfreegeoip.orgdRegAsm.exe, 00000003.00000002.2694976808.000000000336D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://reallyfreegeoip.orgRegAsm.exe, 00000003.00000002.2694976808.000000000336D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.orgdRegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.orgRegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.orgRegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2694976808.000000000333E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://checkip.dyndns.comRegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://checkip.dyndns.org/dRegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000003.00000002.2694976808.00000000032D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://reallyfreegeoip.org/xml/8.46.123.175lRegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://api.telegram.org/bot-/sendDocument?chat_id=holy.exe, 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            high
                                                            https://reallyfreegeoip.org/xml/holy.exe, 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, holy.exe, 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.2694976808.0000000003350000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              104.21.67.152
                                                              reallyfreegeoip.orgUnited States
                                                              13335CLOUDFLARENETUSfalse
                                                              193.122.6.168
                                                              checkip.dyndns.comUnited States
                                                              31898ORACLE-BMC-31898USfalse
                                                              Joe Sandbox version:41.0.0 Charoite
                                                              Analysis ID:1573553
                                                              Start date and time:2024-12-12 09:01:06 +01:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 6m 9s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:16
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:Request for Quotations and specifications.pdf.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@20/52@3/2
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 100%
                                                              • Number of executed functions: 86
                                                              • Number of non-executed functions: 92
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                              • Excluded IPs from analysis (whitelisted): 88.221.168.141, 50.16.47.176, 34.237.241.83, 54.224.241.105, 18.213.11.84, 172.64.41.3, 162.159.61.3, 23.195.61.56, 217.20.58.98, 2.19.126.143, 2.19.126.149, 88.221.168.226, 3.233.129.217, 23.47.168.24, 20.109.210.53, 13.107.246.63
                                                              • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, p13n.adobe.io, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, armmf.adobe.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, geo2.adobe.com, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                              TimeTypeDescription
                                                              03:02:22API Interceptor2x Sleep call for process: AcroCEF.exe modified
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              104.21.67.152hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                    malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                                      Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                                                        Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          DEC 2024 RFQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            Confirm revised invoice to proceed with payment ASAP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                              Bank Swift and SOA PRN0072700314159453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  193.122.6.168HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  Confirm revised invoice to proceed with payment ASAP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  REQUEST FOR QUOATION AND PRICES 0108603076-24_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  Bank Swift and SOA PRN0072700314159453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  New_Order_List.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  Payment Confirmation..docmGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  1733755327131807265395c8beb00b001ee74b7ae39a6579109a5e4a352d4399291272954e392.dat-decoded.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  Lenticels.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • checkip.dyndns.org/
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  bg.microsoft.map.fastly.netMHDeXPq2uB.exeGet hashmaliciousRedLineBrowse
                                                                                  • 199.232.210.172
                                                                                  n70CrSGL8G.exeGet hashmaliciousRedLineBrowse
                                                                                  • 199.232.214.172
                                                                                  1.eGet hashmaliciousDanaBotBrowse
                                                                                  • 199.232.210.172
                                                                                  xuhu.exeGet hashmaliciousAsyncRATBrowse
                                                                                  • 199.232.210.172
                                                                                  Review_Approval_rocjr.pdfGet hashmaliciousCaptcha Phish, HTMLPhisherBrowse
                                                                                  • 199.232.210.172
                                                                                  https://computeroids.com/hp-printer-driver?utm_source=Google&utm_medium=Click&utm_campaign=HP&utm_term=%7Bkeywords%7D&utm_content=%7Bmedium%7D&tm=tt&ap=gads&aaid=adaHxflMmgPq7&camp_id=12260099411&ad_g_id=118845692873&keyword=install%20hp%20printer%20to%20computer&device=c&network=searchAd&adposition=&gad_source=5&gclid=EAIaIQobChMI0JDUvuabigMV_Uf_AR2MuQCMEAAYASAAEgKQMPD_BwEGet hashmaliciousPureLog StealerBrowse
                                                                                  • 199.232.210.172
                                                                                  phish_alert_sp2_2.0.0.0.emlGet hashmaliciousUnknownBrowse
                                                                                  • 199.232.210.172
                                                                                  Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                  • 199.232.214.172
                                                                                  SSTS218947014.pdfGet hashmaliciousScreenConnect Tool, PhisherBrowse
                                                                                  • 199.232.210.172
                                                                                  Final Demand to Harbor Wholesale Grocery Inc.pdfGet hashmaliciousUnknownBrowse
                                                                                  • 199.232.210.172
                                                                                  reallyfreegeoip.orghesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.67.152
                                                                                  hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.67.152
                                                                                  41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  QUOTES REQUEST FOR PRICES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 172.67.177.134
                                                                                  T#U00fcbitak SAGE RfqF#U0334D#U0334P#U0334..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 172.67.177.134
                                                                                  HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 172.67.177.134
                                                                                  Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  DEC 2024 RFQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.67.152
                                                                                  default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comTyler_In service Agreement889889.pdfGet hashmaliciousUnknownBrowse
                                                                                  • 217.20.58.101
                                                                                  https://download-695-18811-018-webdav-logicaldoc.cdn-serveri4731-ns.shop/Documents/Instruction_695-18014-012_Rev.PDF.lnkGet hashmaliciousUnknownBrowse
                                                                                  • 84.201.211.22
                                                                                  Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                                  • 217.20.58.99
                                                                                  Carisls Open Benefits Enrollment.emlGet hashmaliciousunknownBrowse
                                                                                  • 217.20.58.101
                                                                                  Ou1b9NGTq8.dllGet hashmaliciousUnknownBrowse
                                                                                  • 217.20.58.98
                                                                                  CID5B21A97B8635.pdfGet hashmaliciousCaptcha PhishBrowse
                                                                                  • 217.20.58.101
                                                                                  FG Or#U00e7amento JAN 2025.pdfGet hashmaliciousUnknownBrowse
                                                                                  • 217.20.58.98
                                                                                  Stonhard Response Required 10 Dec, 2024- 0PH8-NYFV0C-ZDU7.msgGet hashmaliciousUnknownBrowse
                                                                                  • 217.20.57.24
                                                                                  Ziraat Bankasi Swift Mesaji.dqy.dllGet hashmaliciousAsyncRAT, VenomRATBrowse
                                                                                  • 217.20.58.98
                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                  • 217.20.58.98
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  ORACLE-BMC-31898UShesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  T#U00fcbitak SAGE RfqF#U0334D#U0334P#U0334..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 193.122.130.0
                                                                                  HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 193.122.6.168
                                                                                  Confirm revised invoice to proceed with payment ASAP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 193.122.6.168
                                                                                  Josho.ppc.elfGet hashmaliciousUnknownBrowse
                                                                                  • 140.238.49.71
                                                                                  Malzeme #U0130stek Formu_12102024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 193.122.130.0
                                                                                  Request for quote.docGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  REQUEST FOR QUOATION AND PRICES 0108603076-24_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                                  • 193.122.6.168
                                                                                  Bank Swift and SOA PRN0072700314159453_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  • 193.122.6.168
                                                                                  CLOUDFLARENETUSAgreement for Cooperation.PDF.lnk.download.lnkGet hashmaliciousRedLineBrowse
                                                                                  • 172.67.223.31
                                                                                  Agreement for YouTube cooperation.pdf.lnk.download.lnkGet hashmaliciousUnknownBrowse
                                                                                  • 172.67.210.76
                                                                                  V7CnS4XGYS.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.143.116
                                                                                  RFQ-004282A.Teknolojileri A.S.exeGet hashmaliciousAgentTeslaBrowse
                                                                                  • 172.67.74.152
                                                                                  hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.67.152
                                                                                  hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.67.152
                                                                                  41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  Strait STS.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • 172.67.216.143
                                                                                  Captcha.htaGet hashmaliciousCobalt Strike, HTMLPhisher, LummaC StealerBrowse
                                                                                  • 172.67.206.64
                                                                                  malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  54328bd36c14bd82ddaa0c04b25ed9adhesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.67.152
                                                                                  hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 104.21.67.152
                                                                                  41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  QUOTES REQUEST FOR PRICES.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  T#U00fcbitak SAGE RfqF#U0334D#U0334P#U0334..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 104.21.67.152
                                                                                  peks66Iy06.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.67.152
                                                                                  XXHYneydvF.exeGet hashmaliciousUnknownBrowse
                                                                                  • 104.21.67.152
                                                                                  HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                  • 104.21.67.152
                                                                                  No context
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):291
                                                                                  Entropy (8bit):5.181304424598763
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:77dA34q2PCHhJ2nKuAl9OmbnIFUt8O7cXZmw+O7cFkwOCHhJ2nKuAl9OmbjLJ:7RxvBHAahFUt8Oc/+Oc56HAaSJ
                                                                                  MD5:D85ED64B07983BE8688C4DEAD280E745
                                                                                  SHA1:04EC8570EFA6A4103C1C0EE8E3BA7C9623C1BAC9
                                                                                  SHA-256:EEC529551EBF964FCA857C91E11EF0DD6EBD5831DA62027C61C88DFE86826E4E
                                                                                  SHA-512:0D2367B1FC68F8E96572A48273B6E09037EF0EA969AA55A8079D66058BC6346A9B47371DC189117D0BCDB204349918B7EC1F54C71BDD8011B0CA89708023040E
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:2024/12/12-03:02:11.896 7c4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/12-03:02:11.902 7c4 Recovering log #3.2024/12/12-03:02:11.902 7c4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):291
                                                                                  Entropy (8bit):5.181304424598763
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:77dA34q2PCHhJ2nKuAl9OmbnIFUt8O7cXZmw+O7cFkwOCHhJ2nKuAl9OmbjLJ:7RxvBHAahFUt8Oc/+Oc56HAaSJ
                                                                                  MD5:D85ED64B07983BE8688C4DEAD280E745
                                                                                  SHA1:04EC8570EFA6A4103C1C0EE8E3BA7C9623C1BAC9
                                                                                  SHA-256:EEC529551EBF964FCA857C91E11EF0DD6EBD5831DA62027C61C88DFE86826E4E
                                                                                  SHA-512:0D2367B1FC68F8E96572A48273B6E09037EF0EA969AA55A8079D66058BC6346A9B47371DC189117D0BCDB204349918B7EC1F54C71BDD8011B0CA89708023040E
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:2024/12/12-03:02:11.896 7c4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/12-03:02:11.902 7c4 Recovering log #3.2024/12/12-03:02:11.902 7c4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):335
                                                                                  Entropy (8bit):5.146259478446161
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:771UGFwDM+q2PCHhJ2nKuAl9Ombzo2jMGIFUt8O7PGtgZmw+O7BtDMVkwOCHhJ2g:7OGFwDM+vBHAa8uFUt8OzGtg/+OrDMVH
                                                                                  MD5:26F7F7B9A588C37097A22BC77E6B58B8
                                                                                  SHA1:76E6EC967A4C8052CFD3F2E5E98B1291A1686C53
                                                                                  SHA-256:788FE710E565314F78A32393231B124CCD6ADC37FFCCEE7CF430486C2E0CF633
                                                                                  SHA-512:839DB3057DE91FB53C417766ACB4195B9D2E221D251D39DAA045C2E2F3E8E42AAD0295D5870294AF599272E2AD4D27ABAB76A87A035FCA57D113DE38B9375114
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:2024/12/12-03:02:11.961 cfc Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/12/12-03:02:11.963 cfc Recovering log #3.2024/12/12-03:02:11.964 cfc Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):335
                                                                                  Entropy (8bit):5.146259478446161
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:771UGFwDM+q2PCHhJ2nKuAl9Ombzo2jMGIFUt8O7PGtgZmw+O7BtDMVkwOCHhJ2g:7OGFwDM+vBHAa8uFUt8OzGtg/+OrDMVH
                                                                                  MD5:26F7F7B9A588C37097A22BC77E6B58B8
                                                                                  SHA1:76E6EC967A4C8052CFD3F2E5E98B1291A1686C53
                                                                                  SHA-256:788FE710E565314F78A32393231B124CCD6ADC37FFCCEE7CF430486C2E0CF633
                                                                                  SHA-512:839DB3057DE91FB53C417766ACB4195B9D2E221D251D39DAA045C2E2F3E8E42AAD0295D5870294AF599272E2AD4D27ABAB76A87A035FCA57D113DE38B9375114
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:2024/12/12-03:02:11.961 cfc Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/12/12-03:02:11.963 cfc Recovering log #3.2024/12/12-03:02:11.964 cfc Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:JSON data
                                                                                  Category:modified
                                                                                  Size (bytes):475
                                                                                  Entropy (8bit):4.967105522201735
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:YH/um3RA8sqy6hsBdOg2HZcaq3QYiub6P7E4TX:Y2sRds5dMHg3QYhbS7n7
                                                                                  MD5:ECBE2AC4933ED1F5867218A82FB523C1
                                                                                  SHA1:D5D63D4F6903DD3AE723B206B4DC52E300B56C72
                                                                                  SHA-256:7EB8D75B8351EF4EE2727AEE50EFB01C57596DB69648DF387530D03E3AA2979F
                                                                                  SHA-512:B7219139A73F4DCA98A61522A814B6FBB085337F76118B93A9BFE93653C7FC88467035385A04AA0BBB0839DF8DD01738EFFA1BB283D48BA30F40F92E2ED901CA
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13378550544045854","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":937417},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.8","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):475
                                                                                  Entropy (8bit):4.963247713778661
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:YH/um3RA8sqRYSsBdOg2HEcaq3QYiub6P7E4TX:Y2sRds9dMHX3QYhbS7n7
                                                                                  MD5:D46529E824E6E834D0D750C5560C136C
                                                                                  SHA1:E6597929E439E6AF24CE7249F0D303987F0760BF
                                                                                  SHA-256:818753A5C6D3C843FBA032CCB1B1681F6226C17B388A1E3052774B1DD8809C72
                                                                                  SHA-512:CE939B02393B7F46CE528527A40DCB56023CF6682B664D5685354CDA51388EE603FCAF018A428EFB08AD5800B68847F6F512B05F6D772E435507EE32BCEA0963
                                                                                  Malicious:false
                                                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341054937965898","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":146333},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.8","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):475
                                                                                  Entropy (8bit):4.963247713778661
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:YH/um3RA8sqRYSsBdOg2HEcaq3QYiub6P7E4TX:Y2sRds9dMHX3QYhbS7n7
                                                                                  MD5:D46529E824E6E834D0D750C5560C136C
                                                                                  SHA1:E6597929E439E6AF24CE7249F0D303987F0760BF
                                                                                  SHA-256:818753A5C6D3C843FBA032CCB1B1681F6226C17B388A1E3052774B1DD8809C72
                                                                                  SHA-512:CE939B02393B7F46CE528527A40DCB56023CF6682B664D5685354CDA51388EE603FCAF018A428EFB08AD5800B68847F6F512B05F6D772E435507EE32BCEA0963
                                                                                  Malicious:false
                                                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341054937965898","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":146333},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.8","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):475
                                                                                  Entropy (8bit):4.963247713778661
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:YH/um3RA8sqRYSsBdOg2HEcaq3QYiub6P7E4TX:Y2sRds9dMHX3QYhbS7n7
                                                                                  MD5:D46529E824E6E834D0D750C5560C136C
                                                                                  SHA1:E6597929E439E6AF24CE7249F0D303987F0760BF
                                                                                  SHA-256:818753A5C6D3C843FBA032CCB1B1681F6226C17B388A1E3052774B1DD8809C72
                                                                                  SHA-512:CE939B02393B7F46CE528527A40DCB56023CF6682B664D5685354CDA51388EE603FCAF018A428EFB08AD5800B68847F6F512B05F6D772E435507EE32BCEA0963
                                                                                  Malicious:false
                                                                                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341054937965898","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":146333},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.8","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):3878
                                                                                  Entropy (8bit):5.2387156039527305
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:S4bz5vsZ4CzSAsfTxiVud4TxY0CIOr3MCWO3VxBaw+bptkOgT:S43C4mS7fFi0KFYDjr3LWO3V3aw+bpta
                                                                                  MD5:04BF9E82C0A7DF6718B01EF6505EE965
                                                                                  SHA1:115234CB65260D95678BD3E312B0B11F10F918C4
                                                                                  SHA-256:F5A0881AAF95AF89D21946CBECEBBF56D8D30573AAE6FFD5000C4C8416017F2B
                                                                                  SHA-512:C03ED1D0B68C8CBD7A58B6FC4095F86FE6C3B3DDD64BAC3B53418B22CFAC3BA93C8F0FD3ACD3756F8149B8925AF39A0DC295A7FCC6EDD55102066524EF141942
                                                                                  Malicious:false
                                                                                  Preview:*...#................version.1..namespace-8..|o................next-map-id.1.Pnamespace-656dc224_0825_4dad_892f_a4fe9098071c-https://rna-resource.acrobat.com/.0...dr................next-map-id.2.Snamespace-ef12e1ab_9f14_41d7_aae3_3f05adf09ebc-https://rna-v2-resource.acrobat.com/.1....r................next-map-id.3.Snamespace-07eb38e9_046b_46c4_bd67_b1578df56145-https://rna-v2-resource.acrobat.com/.2.$..o................next-map-id.4.Pnamespace-f0c0a73c_e89b_42d5_bb63_4f8a3b04cf3a-https://rna-resource.acrobat.com/.3+...^...............Pnamespace-656dc224_0825_4dad_892f_a4fe9098071c-https://rna-resource.acrobat.com/....^...............Pnamespace-f0c0a73c_e89b_42d5_bb63_4f8a3b04cf3a-https://rna-resource.acrobat.com/T.3.a...............Snamespace-ef12e1ab_9f14_41d7_aae3_3f05adf09ebc-https://rna-v2-resource.acrobat.com/.U..a...............Snamespace-07eb38e9_046b_46c4_bd67_b1578df56145-https://rna-v2-resource.acrobat.com/.$..o................next-map-id.5.Pnamespace-c66013b9_73b6_4b3f_b279_
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):323
                                                                                  Entropy (8bit):5.114710806812602
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:77wjDOwDM+q2PCHhJ2nKuAl9OmbzNMxIFUt8O7wj4DpgZmw+O7wjvDMVkwOCHhJS:7sjKwDM+vBHAa8jFUt8Osj4Dpg/+Osjn
                                                                                  MD5:47C171FF4D37B1C3BE9BBAD5922681F6
                                                                                  SHA1:C7379CF576B05130D7A3BF1CEA13093A03A06B3E
                                                                                  SHA-256:F046F8D359C3A912E740DF720F47A2BB5A5E172D6A6D1DC1CF07E230EDC1ABC9
                                                                                  SHA-512:69BB255C17EA9B54A4ACB60DF904B14D76E6E86A31D0FA746FA66E4044904CE6B4D93629BD9C4FB6C8A3388F70B80C9CAB7F75333FB9BABB4703905DC4B0E272
                                                                                  Malicious:false
                                                                                  Preview:2024/12/12-03:02:12.225 cfc Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/12/12-03:02:12.226 cfc Recovering log #3.2024/12/12-03:02:12.227 cfc Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):323
                                                                                  Entropy (8bit):5.114710806812602
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:77wjDOwDM+q2PCHhJ2nKuAl9OmbzNMxIFUt8O7wj4DpgZmw+O7wjvDMVkwOCHhJS:7sjKwDM+vBHAa8jFUt8Osj4Dpg/+Osjn
                                                                                  MD5:47C171FF4D37B1C3BE9BBAD5922681F6
                                                                                  SHA1:C7379CF576B05130D7A3BF1CEA13093A03A06B3E
                                                                                  SHA-256:F046F8D359C3A912E740DF720F47A2BB5A5E172D6A6D1DC1CF07E230EDC1ABC9
                                                                                  SHA-512:69BB255C17EA9B54A4ACB60DF904B14D76E6E86A31D0FA746FA66E4044904CE6B4D93629BD9C4FB6C8A3388F70B80C9CAB7F75333FB9BABB4703905DC4B0E272
                                                                                  Malicious:false
                                                                                  Preview:2024/12/12-03:02:12.225 cfc Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/12/12-03:02:12.226 cfc Recovering log #3.2024/12/12-03:02:12.227 cfc Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:Certificate, Version=3
                                                                                  Category:dropped
                                                                                  Size (bytes):1391
                                                                                  Entropy (8bit):7.705940075877404
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                                                                  MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                                                                  SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                                                                  SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                                                                  SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                                                                  Malicious:false
                                                                                  Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                                  Category:dropped
                                                                                  Size (bytes):71954
                                                                                  Entropy (8bit):7.996617769952133
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                                                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                                                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                                                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                                                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                                                  Malicious:false
                                                                                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):192
                                                                                  Entropy (8bit):2.732136534099205
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:kkFklPpKRVltfllXlE/HT8km/tNNX8RolJuRdxLlGB9lQRYwpDdt:kKFRVleT8hNMa8RdWBwRd
                                                                                  MD5:6DB939E24BB1CBAB2C78D621FBA09596
                                                                                  SHA1:4804F5302FF84040B84C00611F3640DFF92930F7
                                                                                  SHA-256:F86BAC126CB3E5657165B2AA7D60769705F0F26507582C54429F15F368140FDF
                                                                                  SHA-512:8C4815926F56B72CC270DF071DDB0F8EECF5A75ABAC2FDE1C1EEDB955C7E8AFEBDC183A9675D184591ACA51A65E2ADDC1D8FB09F506D0B877FF5AF14D60BE353
                                                                                  Malicious:false
                                                                                  Preview:p...... ........|.o,lL..(....................................................... ..........W....|O..............o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:data
                                                                                  Category:modified
                                                                                  Size (bytes):328
                                                                                  Entropy (8bit):3.1391791584200512
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:kKlLllL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:NLaDnLNkPlE99SNxAhUe/3
                                                                                  MD5:C46B6544AB7C6A3DC9E0A041462CE824
                                                                                  SHA1:1184C969510A1AF0C6E825054F4EB28E91D150ED
                                                                                  SHA-256:FB6FD304651EC464334E7CAE320195AD74EB873A8BBB3AF4C02EF6BC72DCABBE
                                                                                  SHA-512:72C06E25BE903545B804868377F2CECCD95E4C7E53E2F73318F2C9D730FE07888DB0E15B90F56CF54715434E2395ED6DF452766E64EB976B4D70A3ED5B835CBB
                                                                                  Malicious:false
                                                                                  Preview:p...... ..........?lL..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:PostScript document text
                                                                                  Category:dropped
                                                                                  Size (bytes):1233
                                                                                  Entropy (8bit):5.233980037532449
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                  MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                  SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                  SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                  SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                  Malicious:false
                                                                                  Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:PostScript document text
                                                                                  Category:dropped
                                                                                  Size (bytes):1233
                                                                                  Entropy (8bit):5.233980037532449
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                  MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                  SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                  SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                  SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                  Malicious:false
                                                                                  Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:PostScript document text
                                                                                  Category:dropped
                                                                                  Size (bytes):1233
                                                                                  Entropy (8bit):5.233980037532449
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                                  MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                                  SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                                  SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                                  SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                                  Malicious:false
                                                                                  Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:PostScript document text
                                                                                  Category:dropped
                                                                                  Size (bytes):10880
                                                                                  Entropy (8bit):5.214360287289079
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                                                  MD5:B60EE534029885BD6DECA42D1263BDC0
                                                                                  SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                                                  SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                                                  SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                                                  Malicious:false
                                                                                  Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:PostScript document text
                                                                                  Category:dropped
                                                                                  Size (bytes):10880
                                                                                  Entropy (8bit):5.214360287289079
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                                                  MD5:B60EE534029885BD6DECA42D1263BDC0
                                                                                  SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                                                  SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                                                  SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                                                  Malicious:false
                                                                                  Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):295
                                                                                  Entropy (8bit):5.348547761738924
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJM3g98kUwPeUkwRe9:YvXKXB6NtrvR/ZwHA9GMbLUkee9
                                                                                  MD5:C4FBC91E02D378DD0779D4CAEA8B8428
                                                                                  SHA1:E2358871D71054AEE8118E35E638DD5AEAFC59F8
                                                                                  SHA-256:A0FB4BD68503EB1B8E8F0599781703BEE7653D57B46FA0D90C360537300B149C
                                                                                  SHA-512:B54B41D0BCA5AD2FDE5E48E35C1807B3A72B89EC2160D9D0EA8A7D516B4C99F3482AD74C9BFD5A996A9D698BFBAC6B27C5012A8AE58C050BE5D12C9233C40C1C
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):294
                                                                                  Entropy (8bit):5.2829858545003265
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfBoTfXpnrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GWTfXcUkee9
                                                                                  MD5:291EFFE75A3EB17F1A007E0F81F1A386
                                                                                  SHA1:BEC135FCF4067891E248F2B72D687758F6F84756
                                                                                  SHA-256:139AD204B7413A9C97F0E73521E73A5C1D15C007FAE8A2AB021B7445F7623D63
                                                                                  SHA-512:82C14C1D1B76B5DF9F5155C1838475D8B74F5D625BA537029D2F4F0137AF80BB6541B54070D610F75AA7B7179408F2DABFC81DA7C53F2323CFFFB0684B60A6D4
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):294
                                                                                  Entropy (8bit):5.261980889895403
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfBD2G6UpnrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GR22cUkee9
                                                                                  MD5:CBDC4D5C5E2B5D99CE02086DE4633B8B
                                                                                  SHA1:B4750B0FD6875A16EB7C863746193C064AC1E1C7
                                                                                  SHA-256:C24D801AEED112D8E8C511C81F323CFF018604BBCBC296257528063CE698AE83
                                                                                  SHA-512:D865E7D5678C51646A4C58956AA2591CA2101DFA5FEC6FDC1B0C3178D7CE903F5A073164417BD69BC70929A22687CB487639BF8EFAB0A863A2B6BFE2D59A22D0
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):285
                                                                                  Entropy (8bit):5.32497646180779
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfPmwrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GH56Ukee9
                                                                                  MD5:DF8645BF7705EB54C016D2AE409EA1C6
                                                                                  SHA1:ABF6A2CDCC21BDD48D7075C392243B26F0317057
                                                                                  SHA-256:A0D43E4DE3580B31DCA1099FA4C1FD7EA6ED53468181CC7093CA3F50EC7AE5FA
                                                                                  SHA-512:E4A0108AFC15D10221DA4C27FB5ECEBD40BF2E25D1330DC7B601F7BB8D4A9CACE795D1C637F49248B1FA3D8E60E7FCFFE9102FE4B11EB10CBF81F3F99C7D3E1E
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):1123
                                                                                  Entropy (8bit):5.687973456763737
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:Yv6XBcrJhWpLgE9cQx8LennAvzBvkn0RCmK8czOCCSIEWBY:YvE4JhWhgy6SAFv5Ah8cv/P
                                                                                  MD5:C92F759C6A38E4462A58BA98AD59EE7E
                                                                                  SHA1:57671DC78E19DF1ACD96258F0BD0D407284E3AE5
                                                                                  SHA-256:1CF080EB56BA291F19CA24BB2594BBBE2DDA48ED3DEFFFE5D5E16695C80FC149
                                                                                  SHA-512:706E8CFCE7545404CE5346D9AD3CBB98E60E52E70C4B6155B323278AD0222C0FC8CAEBD57DAEF03A4CAD24B2756EC1900A49328A472F44CA0BC88E65EA93A618
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):289
                                                                                  Entropy (8bit):5.2742875246627
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJf8dPeUkwRe9:YvXKXB6NtrvR/ZwHA9GU8Ukee9
                                                                                  MD5:623426352B66E68B3116F3954933EF89
                                                                                  SHA1:8E73651C26F3F00E67F766667B0A655A4DB3DB95
                                                                                  SHA-256:7786976FEE17312F18A902482029CF4B9BB1DB2C0634A361AA0D224E43EDCB95
                                                                                  SHA-512:587317FC17D8BB0AD360FFE0ABC2540DEF8A78A370493EEC872CDE2D5AFAB0776508A760E12AA8876031AA61EFA64F230D194403F57533C57FB7C15A1AA0F1FE
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):292
                                                                                  Entropy (8bit):5.272939862175992
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfQ1rPeUkwRe9:YvXKXB6NtrvR/ZwHA9GY16Ukee9
                                                                                  MD5:EB671D13F0E73730AAE3F8278E6ACEAE
                                                                                  SHA1:81D2D60684C5D0D53BDB706E2404DF2E1FA962AC
                                                                                  SHA-256:48AE363F6168ADB2DBD95DEAC79E0F46476D6FB4DC1A38E169DE2719394EBF02
                                                                                  SHA-512:21B52C4A6C221BF22B2A6518676997701FB3E5FC94EBE8AC9AF7997CDA85B4D5B260843906424011EE484D36A26339BD446587A4C331EAB791B3855789D4311F
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):289
                                                                                  Entropy (8bit):5.289260233007157
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfFldPeUkwRe9:YvXKXB6NtrvR/ZwHA9Gz8Ukee9
                                                                                  MD5:C792D4B7EB58A8BEB548260E401FC645
                                                                                  SHA1:06B3066B81474135A9E0522634E0B54C3D663852
                                                                                  SHA-256:120C6D34EF466BAA914FF8753E753DE3C4E66599E57A580CD5DE7BA1488C3EA9
                                                                                  SHA-512:C3FF9DB3F9164CA884856D3F9FA0C2CD01245E7906C25976E7815017B42C246CB65B7DBFC4D69D35C607DD689F967C5DF87998FB49AFE9112CA99BB87E2C6719
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):295
                                                                                  Entropy (8bit):5.302340275679065
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfzdPeUkwRe9:YvXKXB6NtrvR/ZwHA9Gb8Ukee9
                                                                                  MD5:775EACD1A9BF92ABD17504BB3D585A17
                                                                                  SHA1:05BDBB59DA4ED4DE80E70A9A84A8BB214E7F3F7F
                                                                                  SHA-256:4FFE0058D0EA33493853468F6DB29520795DBB408FEDA9253A9308652787808F
                                                                                  SHA-512:A73EEBB606479562B6A6D44FC88B5759AA0582CAB0253DB8A0F1B80B5713F13080DFB39F3EB10D6239964AD3B75440AC064F63440EF23AA5040532A679D10DDF
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):289
                                                                                  Entropy (8bit):5.282630592600029
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfYdPeUkwRe9:YvXKXB6NtrvR/ZwHA9Gg8Ukee9
                                                                                  MD5:1311BC1B2F855897BB4CCBEB0895635F
                                                                                  SHA1:9FE8B1758A451F1DA0963D768E0F2E407642EB4B
                                                                                  SHA-256:0508BFC61A233DBC9EBA3A50F315D4314E748BE2E541A56116BEF08238A33FEF
                                                                                  SHA-512:622C29729D422732B61E0753E76AE1E6C2DEF11015298F79EAE88AB2446DDEAB504CA6101A044864C40B81CA12EC537F3BC9B9460C20847E01FE68E6418C9652
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):284
                                                                                  Entropy (8bit):5.268674156924488
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJf+dPeUkwRe9:YvXKXB6NtrvR/ZwHA9G28Ukee9
                                                                                  MD5:0643FE178031959A78AEF12EA607DCAB
                                                                                  SHA1:6C2AF77B276E27BAC2D08027B3E1787AD1F0DA63
                                                                                  SHA-256:DF5638D897D31A2A43C9F8E23CEFB522D2D7D48D8CA08DA3152336203EE8AACE
                                                                                  SHA-512:5432FDDF93444D3CA8147D31C020519A4FD6B72C096F1D3232D3D1E0D4EDFA9E06CA91F7EB1707BC5CC2077CCCD439192572E002399D855785EBCD43692738EE
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):291
                                                                                  Entropy (8bit):5.26629706764434
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfbPtdPeUkwRe9:YvXKXB6NtrvR/ZwHA9GDV8Ukee9
                                                                                  MD5:BE1622DCEBC68EF1A11A3851168A6EE1
                                                                                  SHA1:75C4B0063EFE368FABE6A1F7B9F4CF0FEC19BE03
                                                                                  SHA-256:8026B87E84F9E94C421B51DE90F6FA4DB4C7269625F93D845ED5E3E52A3B06AB
                                                                                  SHA-512:AFE87E2034FCD51E79696EC7EAFD7D0856F39481B278652DC5F038EC88ACBFF5C5C9A3534064A530BBC1ACF7EE7448195C8177A13E47AFCCD62A5902B2F7BD85
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):287
                                                                                  Entropy (8bit):5.265099598348317
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJf21rPeUkwRe9:YvXKXB6NtrvR/ZwHA9G+16Ukee9
                                                                                  MD5:D524845EF8BD02C6F2E341B88DB45A9C
                                                                                  SHA1:C4E19865A918F1F13DA050E1CC962E97DC1FAB54
                                                                                  SHA-256:49A6555CBA895EF1EBCFF16BD9BF91098B8172665BD7AF53475591AF89EB1FC0
                                                                                  SHA-512:0CDB623002F16DA4DCC38AE5805F727E897A19FA2D571283DF5DCAE860383F3583A329CDAA390B657A50D4E8DE200C218085873A0179E5FEC959B0846960C845
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):1090
                                                                                  Entropy (8bit):5.6655891293675085
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:Yv6XBcrJhKamXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BSIEWBY:YvE4JhEBgkDMUJUAh8cvMP
                                                                                  MD5:251E1C3A028D62BFC2DE5F10588BBA39
                                                                                  SHA1:D8E158528470F5C1434B048B56DD37B0B402BC3E
                                                                                  SHA-256:8EE722174945EDBA4047D8089458191D4E181AB0805E3D2D31F10A69DCAFC147
                                                                                  SHA-512:AA2D5D861610D3253A435799B6CC78FD8E9B582A4BE37227C81733D136BA683325967556897AA20F7EE416D573006E6CC5B84118D2A5A682D59A962DBA23C258
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):286
                                                                                  Entropy (8bit):5.240660178762542
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfshHHrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GUUUkee9
                                                                                  MD5:180DA0D97ACE13070A4FE115244F3773
                                                                                  SHA1:F0A2C5A030571E0B47EF9CCDE8243E1DDD56B0BE
                                                                                  SHA-256:3DFB39B14A0129BA243E76EF170225F8850BAF014E85BBBA861CDF22246B8FB7
                                                                                  SHA-512:C008BB761C182A55091CBA7ED45086E4DFB2F4ABDCFC3BDA08E820502B76598C76182D6641F93CC5F77818CED4F392C5D2F5BB0FECAA64EFF6553A0BE9F76FEF
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):282
                                                                                  Entropy (8bit):5.264768921613848
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJTqgFCrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GTq16Ukee9
                                                                                  MD5:C5615BBC5A71C44D85153AA414E52C5B
                                                                                  SHA1:DD6DCCF69DE8B80342787DAD7900F43C1DE3999B
                                                                                  SHA-256:036DEB2BD9043CF457E11903DB90B90F7B092B8676743F2240B0F2B8F52BCED3
                                                                                  SHA-512:7D72346A60A050A35DCAEF6462BE97B31AEF6256F925105BAF2B02494CB4B3B275305D489F39695F11A0B803B358232E4660F2A51791A8CA4210471CC02A29CD
                                                                                  Malicious:false
                                                                                  Preview:{"analyticsData":{"responseGUID":"6d90b737-2be3-4fbb-bab7-cfe6fa854873","sophiaUUID":"6BC8D74A-F8DC-462C-8ED4-D40FDD780397"},"encodingScheme":true,"expirationDTS":1734168173435,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):0.8112781244591328
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:e:e
                                                                                  MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                                                  SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                                                  SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                                                  SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                                                  Malicious:false
                                                                                  Preview:....
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):2814
                                                                                  Entropy (8bit):5.135659202090742
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:YPWE4aaayTEt45ZSEZTwrEzdSWnEJgBWEgWE0DHPfEVj4Fj0S5ENbOxaEY2Z2LSj:YUF8W59ce2Fc23l16PvTodng9Lt
                                                                                  MD5:BC8CD05D25350DD41C392AED011364E8
                                                                                  SHA1:ED8D0B4B2B12DFDFD2358B0409657F91761CE1EA
                                                                                  SHA-256:5D259153634470CC34EF200C88802D4581FFEAB08478757B5B3F240878BE17A1
                                                                                  SHA-512:AD0A35AA90E8E10A62528F521FA18AEFF90A2C073D53BE29956A85CC6DCE00F6D671D256485C1B7231D9774AB638371D014F77755D71DEA66570ED76725E8AE4
                                                                                  Malicious:false
                                                                                  Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"19205cdafa36d3d8acb03d9b6a5fa2e7","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1733990542000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"71a0e176dced7bb034e9339e1d13007a","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1733990542000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"f984cd61d7ac094fdef598af12e8f17d","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1733990542000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"e791db669c82cd136d241397a4f31f5f","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1733990542000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"6a7743530de18d569bf87c8d4d305ef0","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1733990542000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"863f9fd2acfe44b45ceb391fac75214e","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                                                                                  Category:dropped
                                                                                  Size (bytes):12288
                                                                                  Entropy (8bit):1.318804102521374
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:TGufl2GL7ms9WR1CPmPbPahkPQypilIuP2:lNVms9WfMwbPahkoFu
                                                                                  MD5:9EC83D4183770AC74ED8D467C1740BA0
                                                                                  SHA1:BD9330E2AB7A0FF34B12D61DAABA7D21F70338F0
                                                                                  SHA-256:4786909CE8C255848832352DB21BBF6E8BB72D3AC86644A87D28645F8A7EB57C
                                                                                  SHA-512:C971027958E0A27FF372BE8F6CF094CF55F7AAC180E1675C3A51B69883B7337D46D3C1ADAC6512274783FCD2C93290DBFA6CD70FD05D74D068641376392CF010
                                                                                  Malicious:false
                                                                                  Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:SQLite Rollback Journal
                                                                                  Category:dropped
                                                                                  Size (bytes):8720
                                                                                  Entropy (8bit):1.7811406316776563
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:7M7WR1CPmPbPahkPVypilItqFl2GL7msg:7KWfMwbPahkd4KVmsg
                                                                                  MD5:55908BEACC59A0FDAF6F6CABF83B5A89
                                                                                  SHA1:A7DF929871E32262F414FAE6818EF9BBC293AED5
                                                                                  SHA-256:D6A468528CB4550612CECE921F3D75B7A01CCDC7EFC06D0C3D6B1690112EA145
                                                                                  SHA-512:C1CB5D70BCD4ADA269E25AC10B456EAC421FAA1714DA3B0DEC4D7A8A264584C50E14F8309A1E4A3B81C2F1F73C3888FFA62BC359F7BB11C2885B7233D26AD86B
                                                                                  Malicious:false
                                                                                  Preview:.... .c......PZ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................^..^.^.^.^.^.^.^.p.p.p.p.p.p.p.p.p.p..........................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):66726
                                                                                  Entropy (8bit):5.392739213842091
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:RNOpblrU6TBH44ADKZEggwuA3VB65WcR9QwvEy7wr2jpzZiYyu:6a6TZ44ADERuA3Vo9Tnwr2jpzgK
                                                                                  MD5:0664CDE7FF7B0BE15CE2028C8DCE5BD3
                                                                                  SHA1:62256E0EC89B6D0CCEFA34B0EF1E0A0B9401D164
                                                                                  SHA-256:C5B5DA5CF010597513C40DAD021845C4164D1A445E7FC9E63FA8BB1DDB133147
                                                                                  SHA-512:A0F1FF0C073A493B7F4124AA076599F64A0127D1FA1CE54A5F5BFBF3C2973C15D9B5EE7EFD4A7D8273BD8D6550D6870B088FBC263CC476C87D2B8555C208E2FD
                                                                                  Malicious:false
                                                                                  Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                                                  Process:C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):617
                                                                                  Entropy (8bit):5.3554278163807965
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKharkvoDLI4MWuCt92n4M6:ML9E4KlKDE4KhKiKhIE4Ko84j
                                                                                  MD5:A47392ECAB97B1AD6350E5445F07F3FD
                                                                                  SHA1:C9AE28B3118306868E7AE54B212C853C7ED9705E
                                                                                  SHA-256:925EBF33DCB86A12A8CA3195D01B72FAC0840B408C07D079A612E40646BF03F2
                                                                                  SHA-512:681B8D60FCFDAB4067DC6EEC62D9841B33F8EA6319C38CBAC1544BBEF5B9F14AB37129DBEFB1F1FF6F119B33792A37C415B1D88E292B3D9907F0AFBDD07E721D
                                                                                  Malicious:false
                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):246
                                                                                  Entropy (8bit):3.486646639490294
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8qKDgalYH:Qw946cPbiOxDlbYnuRKtKEuYH
                                                                                  MD5:4BAD71A236E70F7F2B628423969F8352
                                                                                  SHA1:211E950ACF2C3DC5971C86F26DF147BC279A3802
                                                                                  SHA-256:91E3D7CEA29B1B8255424E779ECF087D57FA5E675667F51640A91090D02D49D5
                                                                                  SHA-512:EEE9FF8F28B2F2FFDAA0389882963CE188D7AB5DA9B101D3F2F8057C720B046AD19F88FB6607D8564869538B1EDFB5734622FBB97B3B5B50702F5AEB6043B663
                                                                                  Malicious:false
                                                                                  Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .1.2./.1.2./.2.0.2.4. . .0.3.:.0.2.:.2.0. .=.=.=.....
                                                                                  Process:C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):477184
                                                                                  Entropy (8bit):7.049584533826611
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:BDD86eavzyToezlwxtESyz0nixBOaKAZToI+XFAXJP7nVEPUefKbd+hQ+W3F5gy:FDXeavzyToea5yzOq+XOXJP7nes2UL
                                                                                  MD5:F072A1E438C9D2453EE1B74027D07DD2
                                                                                  SHA1:32EB35774177A028851E314C333E51355674DA37
                                                                                  SHA-256:54ADF0A0FF5F28C4284F20DADF8B5EE4D5D43D93296690DF95951F202467A423
                                                                                  SHA-512:E64176BA5894056BA9BCA488C32E7218DB9C4F14DF7DA97BD65EF1BC0C563C690D549643B12FC6862F9634B70E7FE9EACFB37F0CCC16855C6F36C5B73094B661
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: Virustotal, Detection: 46%, Browse
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;................0..>...........\... ...`....@.. ....................................@.................................x\..S....`............................................................................... ............... ..H............text....<... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............F..............@..B.................\......H...........\}.........../..............................................^..}.....( ......(.....*~(....(....(....rA..p(m........*&.(=.....*".......*".(A....*Vs....(B...t.........*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..(=.......(.......(.......(........(......sC...(.....*>..(.....oD....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..(=.......(.......(.......(!.....sF...(#....*>..("....oG....*..{....*"..}....
                                                                                  Process:C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe
                                                                                  File Type:PDF document, version 1.7, 1 pages
                                                                                  Category:dropped
                                                                                  Size (bytes):41950
                                                                                  Entropy (8bit):7.990999767126439
                                                                                  Encrypted:true
                                                                                  SSDEEP:768:/Iv9D+uwNaqaOD5SeA6DZDL4gZsSzygZ/D5sqJo3IBWrquzSfeXxLEYF:/IYaqacL4Wy4/1y3X4OpF
                                                                                  MD5:E6BDF42550DA919F083B74F06E629703
                                                                                  SHA1:6278393C436E4C40E625EC9BF812E1685391D09F
                                                                                  SHA-256:82FA4F3CE03D99D100B1D55E731A44A1EF34CEFC6363095F086439F100FBBCA8
                                                                                  SHA-512:70F530AC6F2DAB07ABCD6D4D1F92717D6161524CAB670A29EA2A39357543E1564F25F3C9B5F34CD09DAB21E27AA2D9723A178EED7E7FC8BECC8AD9F4CA6B3B65
                                                                                  Malicious:false
                                                                                  Preview:%PDF-1.7.%.....4 0 obj.<<./Type /XObject./Subtype /Image./Width 1240./Height 826./BitsPerComponent 8./ColorSpace /DeviceRGB./Filter [/FlateDecode /DCTDecode]./DecodeParms [null <<./Quality 60.>>]./Length 41017.>>.stream.x...XT..7.iDB`P.%E.!.{...P..n............T:%.........s..z.y...^.k.{....k.{....u1~1....W....\.JHH@DJOFJBB.JM{..6;..mv.[|..|..B......U.!..^I..F...Z...C....I.IY..X4...4......1..(.8..#.N..A.v.........?..?4t.L,l.\.K#o.....a`.cb`aab".."....X$.<..Z.q..@..Q..L2.Md..-f>...+x.o.SP.daec..........+'.........o`hdi...#k.........w....g._..cb.._%$&ee........y[Y.....}sKk[{GgW...........s...K.+..;.{...G.'.~...h....~.#...............bL,..l.i-..N..... ....+L|.-2........on..v..^.......?.5..c.!'......i.......([.?HK..\6.,..a-9.....>...........,..pe#.-...C.2.....k9..6..UB C../..|.D.....nr.4..@........W.[...r \.se....@ZR..)....P..K...w@.....O.......Wr..l..M.-C..j...`....@Ky..l....F.*.!r .U..20.@ZI..B=g]I....y%.......3...m..E.sL=.5...s.........Y.@Y.p.....@..zH.......a
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:ASCII text, with very long lines (393)
                                                                                  Category:dropped
                                                                                  Size (bytes):16525
                                                                                  Entropy (8bit):5.33860678500249
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:IC2heaVGJMUPhP80d0Wc+9eG/CCihFomva7RVRkfKhZmWWyC7rjgNgXo6ge5iaW0:X8B
                                                                                  MD5:C3FEDB046D1699616E22C50131AAF109
                                                                                  SHA1:C9EEA5A1A16BD2CD8154E8C308C8A336E990CA8D
                                                                                  SHA-256:EA948BAC75D609B74084113392C9F0615D447B7F4AACA78D818205503EACC3FD
                                                                                  SHA-512:845CDB5166B35B39215A051144452BEF9161FFD735B3F8BD232FB9A7588BA016F7939D91B62E27D6728686DFA181EFC3F3CC9954B2EDAB7FC73FCCE850915185
                                                                                  Malicious:false
                                                                                  Preview:SessionID=29b7f1b4-edf3-467e-b302-20b20356cfee.1696494928080 Timestamp=2023-10-05T10:35:28:080+0200 ThreadID=6832 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=29b7f1b4-edf3-467e-b302-20b20356cfee.1696494928080 Timestamp=2023-10-05T10:35:28:081+0200 ThreadID=6832 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=29b7f1b4-edf3-467e-b302-20b20356cfee.1696494928080 Timestamp=2023-10-05T10:35:28:081+0200 ThreadID=6832 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=29b7f1b4-edf3-467e-b302-20b20356cfee.1696494928080 Timestamp=2023-10-05T10:35:28:081+0200 ThreadID=6832 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=29b7f1b4-edf3-467e-b302-20b20356cfee.1696494928080 Timestamp=2023-10-05T10:35:28:081+0200 ThreadID=6832 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):15114
                                                                                  Entropy (8bit):5.346332701893433
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:lzRSFSKSdSx9O9Oq9q9D9T9I9i9x/Q/S/Q/6uUPuUuBuJupugudumYAtAlAXhxh5:llKfiIwUqcRh6czYKoSPPnsKebYKCSgP
                                                                                  MD5:B190B6EC9926B731241EB278BAED07F5
                                                                                  SHA1:A1AFB2BFAA0863789DA10931A2B486CA0D874392
                                                                                  SHA-256:9AAE0180D23B544B460D118885E20C79F392437777C582DFBEDF63E7A931CE83
                                                                                  SHA-512:24D4E3680C6B90DCE2B0101C3FD53BE5144CB1070B84D01659A7019D55C297EB30CC77A14D72B6A21AB7694AAA49106C7347F1420841DBCDF154FB405FD85B01
                                                                                  Malicious:false
                                                                                  Preview:SessionID=7f22960c-4e61-4dba-99d8-d2dd02791976.1733990534214 Timestamp=2024-12-12T03:02:14:214-0500 ThreadID=7556 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=7f22960c-4e61-4dba-99d8-d2dd02791976.1733990534214 Timestamp=2024-12-12T03:02:14:215-0500 ThreadID=7556 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=7f22960c-4e61-4dba-99d8-d2dd02791976.1733990534214 Timestamp=2024-12-12T03:02:14:215-0500 ThreadID=7556 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=7f22960c-4e61-4dba-99d8-d2dd02791976.1733990534214 Timestamp=2024-12-12T03:02:14:215-0500 ThreadID=7556 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=7f22960c-4e61-4dba-99d8-d2dd02791976.1733990534214 Timestamp=2024-12-12T03:02:14:215-0500 ThreadID=7556 Component=ngl-lib_NglAppLib Description="SetConf
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):29752
                                                                                  Entropy (8bit):5.404805252988832
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:TcbeIewcbVcbqI4ucbrcbQIrJcb6cbCIC4cb3cbuIVNcbx:ceo4+rsC2Vq
                                                                                  MD5:9A90DEBB385BFDB86E895588DD40B43C
                                                                                  SHA1:3FE87F43262FC739B09CBBE552B76AEFA795E355
                                                                                  SHA-256:B14E14A0CF78643423C5ADDAA367D04D0B721C3CB7B6D02D9DE01756F62F7FBA
                                                                                  SHA-512:99794656CCC1A23BECCF2278CCE368C43441DBB472E534969174B6E8C8830DF2B4C15E017FBB223F9BB035FDEB308656E60094A89418A2B40B2DF9E8E428A489
                                                                                  Malicious:false
                                                                                  Preview:05-10-2023 10:18:29:.---2---..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : Starting NGL..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..05-10-2023 10:18:29:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..05-10-2023 10:18:29:.Closing File..05-10-
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                                                  Category:dropped
                                                                                  Size (bytes):386528
                                                                                  Entropy (8bit):7.9736851559892425
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                                                  MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                                                  SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                                                  SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                                                  SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                                                  Malicious:false
                                                                                  Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                                                                  Category:dropped
                                                                                  Size (bytes):1407294
                                                                                  Entropy (8bit):7.97605879016224
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo
                                                                                  MD5:A0CFC77914D9BFBDD8BC1B1154A7B364
                                                                                  SHA1:54962BFDF3797C95DC2A4C8B29E873743811AD30
                                                                                  SHA-256:81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685
                                                                                  SHA-512:74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE
                                                                                  Malicious:false
                                                                                  Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                                                  Category:dropped
                                                                                  Size (bytes):758601
                                                                                  Entropy (8bit):7.98639316555857
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                                                  MD5:3A49135134665364308390AC398006F1
                                                                                  SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                                                  SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                                                  SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                                                  Malicious:false
                                                                                  Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                                                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                                                  Category:dropped
                                                                                  Size (bytes):1419751
                                                                                  Entropy (8bit):7.976496077007677
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:uwYIGNPHD9WL07oXGZf1dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:uwZG99WLxXGZV3mlind9i4ufFXpAXkru
                                                                                  MD5:EEA0B822B1F85710138D30EEEC4048D7
                                                                                  SHA1:EFD1465E991ECDE6E21F0CF95450841B5A99A971
                                                                                  SHA-256:ADC3F12372CBE7C64A2F7F7DB3D1AF70AB5D8367A8C809122C74C01233A1A0D0
                                                                                  SHA-512:A8554AA4C4128C83CB275F5CCD260E6F6144A1A931EF7FBB5C4B08010CEA3E6610518E00FB0ED0C93B08EB794220B67C4EB1D1FB642316062357F2B6EE8C3490
                                                                                  Malicious:false
                                                                                  Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                  Entropy (8bit):7.244233360215043
                                                                                  TrID:
                                                                                  • Win64 Executable GUI (202006/5) 92.65%
                                                                                  • Win64 Executable (generic) (12005/4) 5.51%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                  • DOS Executable Generic (2002/1) 0.92%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:Request for Quotations and specifications.pdf.exe
                                                                                  File size:666'699 bytes
                                                                                  MD5:a27b87004e36c99c5ae138960f632287
                                                                                  SHA1:b85c27e89d6eaf68a8cbc0d683546d46b8d270f6
                                                                                  SHA256:31ee50c565b3d2bc907ce74e87ed30d9a282bcdd99995fce3924adb7d7028cb8
                                                                                  SHA512:3c04870f94706737c0ec1019f6154047fd753cac84a19f9ed6313e0fb0a63d6a33e7d9923e7dfb5c0f1d353adfb6613e17e6abf5102701beab02c4828466201d
                                                                                  SSDEEP:12288:PyveQB/fTHIGaPkKEYzURNAwbAg34GzrYkemklmWgq5Smn2sDMMt1l:PuDXTIGaPhEYzUzA0KaYP3l/7b2St7
                                                                                  TLSH:1BE4AE19E3F40CF8E0B7E538D9524902E7763D490B70969F2BA1156A1F3B3D0AD3AB21
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\
                                                                                  Icon Hash:d292c2c2949c9888
                                                                                  Entrypoint:0x140032ee0
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x140000000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x66409723 [Sun May 12 10:17:07 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:5
                                                                                  OS Version Minor:2
                                                                                  File Version Major:5
                                                                                  File Version Minor:2
                                                                                  Subsystem Version Major:5
                                                                                  Subsystem Version Minor:2
                                                                                  Import Hash:b1c5b1beabd90d9fdabd1df0779ea832
                                                                                  Instruction
                                                                                  dec eax
                                                                                  sub esp, 28h
                                                                                  call 00007FC5A8F2B368h
                                                                                  dec eax
                                                                                  add esp, 28h
                                                                                  jmp 00007FC5A8F2ACFFh
                                                                                  int3
                                                                                  int3
                                                                                  dec eax
                                                                                  mov eax, esp
                                                                                  dec eax
                                                                                  mov dword ptr [eax+08h], ebx
                                                                                  dec eax
                                                                                  mov dword ptr [eax+10h], ebp
                                                                                  dec eax
                                                                                  mov dword ptr [eax+18h], esi
                                                                                  dec eax
                                                                                  mov dword ptr [eax+20h], edi
                                                                                  inc ecx
                                                                                  push esi
                                                                                  dec eax
                                                                                  sub esp, 20h
                                                                                  dec ebp
                                                                                  mov edx, dword ptr [ecx+38h]
                                                                                  dec eax
                                                                                  mov esi, edx
                                                                                  dec ebp
                                                                                  mov esi, eax
                                                                                  dec eax
                                                                                  mov ebp, ecx
                                                                                  dec ecx
                                                                                  mov edx, ecx
                                                                                  dec eax
                                                                                  mov ecx, esi
                                                                                  dec ecx
                                                                                  mov edi, ecx
                                                                                  inc ecx
                                                                                  mov ebx, dword ptr [edx]
                                                                                  dec eax
                                                                                  shl ebx, 04h
                                                                                  dec ecx
                                                                                  add ebx, edx
                                                                                  dec esp
                                                                                  lea eax, dword ptr [ebx+04h]
                                                                                  call 00007FC5A8F2A183h
                                                                                  mov eax, dword ptr [ebp+04h]
                                                                                  and al, 66h
                                                                                  neg al
                                                                                  mov eax, 00000001h
                                                                                  sbb edx, edx
                                                                                  neg edx
                                                                                  add edx, eax
                                                                                  test dword ptr [ebx+04h], edx
                                                                                  je 00007FC5A8F2AE93h
                                                                                  dec esp
                                                                                  mov ecx, edi
                                                                                  dec ebp
                                                                                  mov eax, esi
                                                                                  dec eax
                                                                                  mov edx, esi
                                                                                  dec eax
                                                                                  mov ecx, ebp
                                                                                  call 00007FC5A8F2CEA7h
                                                                                  dec eax
                                                                                  mov ebx, dword ptr [esp+30h]
                                                                                  dec eax
                                                                                  mov ebp, dword ptr [esp+38h]
                                                                                  dec eax
                                                                                  mov esi, dword ptr [esp+40h]
                                                                                  dec eax
                                                                                  mov edi, dword ptr [esp+48h]
                                                                                  dec eax
                                                                                  add esp, 20h
                                                                                  inc ecx
                                                                                  pop esi
                                                                                  ret
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  dec eax
                                                                                  sub esp, 48h
                                                                                  dec eax
                                                                                  lea ecx, dword ptr [esp+20h]
                                                                                  call 00007FC5A8F19713h
                                                                                  dec eax
                                                                                  lea edx, dword ptr [00025747h]
                                                                                  dec eax
                                                                                  lea ecx, dword ptr [esp+20h]
                                                                                  call 00007FC5A8F2BF62h
                                                                                  int3
                                                                                  jmp 00007FC5A8F32144h
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  int3
                                                                                  Programming Language:
                                                                                  • [ C ] VS2008 SP1 build 30729
                                                                                  • [IMP] VS2008 SP1 build 30729
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x597a00x34.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x597d40x50.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x8940.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6a0000x306c.pdata
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x790000x970.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x536c00x54.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x537800x28.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4b3f00x140.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x480000x508.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x588bc0x120.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x4676e0x46800f06bb06e02377ae8b223122e53be35c2False0.5372340425531915data6.47079645411382IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x480000x128c40x12a002de06d4a6920a6911e64ff20000ea72fFalse0.4499003775167785data5.273999097784603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x5b0000xe75c0x1a000dbdb901a7d477980097e42e511a94fbFalse0.28275240384615385data3.2571023907881185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .pdata0x6a0000x306c0x3200b0ce0f057741ad2a4ef4717079fa34e9False0.483359375data5.501810413666288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .didat0x6e0000x3600x4001fcc7b1d7a02443319f8fcc2be4ca936False0.2578125data3.0459938492946015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  _RDATA0x6f0000x15c0x2003f331ec50f09ba861beaf955b33712d5False0.408203125data3.3356393424384843IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0x700000x89400x8a00af5b25015032fb043c0ce3790246cb92False0.4205163043478261data6.177360157668852IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x790000x9700xa0077a9ddfc47a5650d6eebbcc823e39532False0.52421875data5.336289720085303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  PNG0x705b40xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                  PNG0x710fc0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                  RT_ICON0x726a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.40602836879432624
                                                                                  RT_ICON0x72b100x1128Device independent bitmap graphic, 32 x 64 x 32, image size 00.20013661202185792
                                                                                  RT_ICON0x73c380x2668Device independent bitmap graphic, 48 x 96 x 32, image size 00.15581773799837267
                                                                                  RT_DIALOG0x762a00x286dataEnglishUnited States0.5092879256965944
                                                                                  RT_DIALOG0x765280x13adataEnglishUnited States0.60828025477707
                                                                                  RT_DIALOG0x766640xecdataEnglishUnited States0.6991525423728814
                                                                                  RT_DIALOG0x767500x12edataEnglishUnited States0.5927152317880795
                                                                                  RT_DIALOG0x768800x338dataEnglishUnited States0.45145631067961167
                                                                                  RT_DIALOG0x76bb80x252dataEnglishUnited States0.5757575757575758
                                                                                  RT_STRING0x76e0c0x1e2dataEnglishUnited States0.3900414937759336
                                                                                  RT_STRING0x76ff00x1ccdataEnglishUnited States0.4282608695652174
                                                                                  RT_STRING0x771bc0x1b8dataEnglishUnited States0.45681818181818185
                                                                                  RT_STRING0x773740x146dataEnglishUnited States0.5153374233128835
                                                                                  RT_STRING0x774bc0x46cdataEnglishUnited States0.3454063604240283
                                                                                  RT_STRING0x779280x166dataEnglishUnited States0.49162011173184356
                                                                                  RT_STRING0x77a900x152dataEnglishUnited States0.5059171597633136
                                                                                  RT_STRING0x77be40x10adataEnglishUnited States0.49624060150375937
                                                                                  RT_STRING0x77cf00xbcdataEnglishUnited States0.6329787234042553
                                                                                  RT_STRING0x77dac0x1c0dataEnglishUnited States0.5178571428571429
                                                                                  RT_STRING0x77f6c0x250dataEnglishUnited States0.44256756756756754
                                                                                  RT_GROUP_ICON0x781bc0x30data0.8541666666666666
                                                                                  RT_MANIFEST0x781ec0x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                                                  DLLImport
                                                                                  KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA
                                                                                  OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                  gdiplus.dllGdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  EnglishUnited States
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-12-12T09:02:13.293315+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.849704193.122.6.16880TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 12, 2024 09:02:11.439990997 CET4970480192.168.2.8193.122.6.168
                                                                                  Dec 12, 2024 09:02:11.559408903 CET8049704193.122.6.168192.168.2.8
                                                                                  Dec 12, 2024 09:02:11.559504032 CET4970480192.168.2.8193.122.6.168
                                                                                  Dec 12, 2024 09:02:11.561352015 CET4970480192.168.2.8193.122.6.168
                                                                                  Dec 12, 2024 09:02:11.680558920 CET8049704193.122.6.168192.168.2.8
                                                                                  Dec 12, 2024 09:02:12.825721025 CET8049704193.122.6.168192.168.2.8
                                                                                  Dec 12, 2024 09:02:12.839361906 CET4970480192.168.2.8193.122.6.168
                                                                                  Dec 12, 2024 09:02:12.959678888 CET8049704193.122.6.168192.168.2.8
                                                                                  Dec 12, 2024 09:02:13.245096922 CET8049704193.122.6.168192.168.2.8
                                                                                  Dec 12, 2024 09:02:13.293314934 CET4970480192.168.2.8193.122.6.168
                                                                                  Dec 12, 2024 09:02:13.473485947 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:02:13.473530054 CET44349705104.21.67.152192.168.2.8
                                                                                  Dec 12, 2024 09:02:13.473953962 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:02:13.527964115 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:02:13.527983904 CET44349705104.21.67.152192.168.2.8
                                                                                  Dec 12, 2024 09:02:14.745136976 CET44349705104.21.67.152192.168.2.8
                                                                                  Dec 12, 2024 09:02:14.745218039 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:02:14.758723021 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:02:14.758744001 CET44349705104.21.67.152192.168.2.8
                                                                                  Dec 12, 2024 09:02:14.759012938 CET44349705104.21.67.152192.168.2.8
                                                                                  Dec 12, 2024 09:02:14.799218893 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:02:15.213589907 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:02:15.259337902 CET44349705104.21.67.152192.168.2.8
                                                                                  Dec 12, 2024 09:02:15.541296959 CET44349705104.21.67.152192.168.2.8
                                                                                  Dec 12, 2024 09:02:15.541357040 CET44349705104.21.67.152192.168.2.8
                                                                                  Dec 12, 2024 09:02:15.541608095 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:02:15.549985886 CET49705443192.168.2.8104.21.67.152
                                                                                  Dec 12, 2024 09:03:18.244684935 CET8049704193.122.6.168192.168.2.8
                                                                                  Dec 12, 2024 09:03:18.244796038 CET4970480192.168.2.8193.122.6.168
                                                                                  Dec 12, 2024 09:03:53.250685930 CET4970480192.168.2.8193.122.6.168
                                                                                  Dec 12, 2024 09:03:53.370122910 CET8049704193.122.6.168192.168.2.8
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 12, 2024 09:02:11.121803045 CET5797553192.168.2.81.1.1.1
                                                                                  Dec 12, 2024 09:02:11.259747982 CET53579751.1.1.1192.168.2.8
                                                                                  Dec 12, 2024 09:02:13.323178053 CET6075353192.168.2.81.1.1.1
                                                                                  Dec 12, 2024 09:02:13.467442036 CET53607531.1.1.1192.168.2.8
                                                                                  Dec 12, 2024 09:02:21.828501940 CET6479053192.168.2.81.1.1.1
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Dec 12, 2024 09:02:11.121803045 CET192.168.2.81.1.1.10xe0afStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:13.323178053 CET192.168.2.81.1.1.10x956eStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:21.828501940 CET192.168.2.81.1.1.10xac0aStandard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Dec 12, 2024 09:02:11.259747982 CET1.1.1.1192.168.2.80xe0afNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:11.259747982 CET1.1.1.1192.168.2.80xe0afNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:11.259747982 CET1.1.1.1192.168.2.80xe0afNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:11.259747982 CET1.1.1.1192.168.2.80xe0afNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:11.259747982 CET1.1.1.1192.168.2.80xe0afNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:11.259747982 CET1.1.1.1192.168.2.80xe0afNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:13.467442036 CET1.1.1.1192.168.2.80x956eNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:13.467442036 CET1.1.1.1192.168.2.80x956eNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:22.044291019 CET1.1.1.1192.168.2.80xac0aNo error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:23.961770058 CET1.1.1.1192.168.2.80xa58bNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:23.961770058 CET1.1.1.1192.168.2.80xa58bNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.98A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:23.961770058 CET1.1.1.1192.168.2.80xa58bNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.100A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:23.961770058 CET1.1.1.1192.168.2.80xa58bNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.101A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:02:23.961770058 CET1.1.1.1192.168.2.80xa58bNo error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.99A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:03:32.635379076 CET1.1.1.1192.168.2.80x7c98No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                  Dec 12, 2024 09:03:32.635379076 CET1.1.1.1192.168.2.80x7c98No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                  • reallyfreegeoip.org
                                                                                  • checkip.dyndns.org
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.849704193.122.6.168802156C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Dec 12, 2024 09:02:11.561352015 CET151OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                  Host: checkip.dyndns.org
                                                                                  Connection: Keep-Alive
                                                                                  Dec 12, 2024 09:02:12.825721025 CET321INHTTP/1.1 200 OK
                                                                                  Date: Thu, 12 Dec 2024 08:02:12 GMT
                                                                                  Content-Type: text/html
                                                                                  Content-Length: 104
                                                                                  Connection: keep-alive
                                                                                  Cache-Control: no-cache
                                                                                  Pragma: no-cache
                                                                                  X-Request-ID: 749a520274212c80c7280b994bc762b0
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.175</body></html>
                                                                                  Dec 12, 2024 09:02:12.839361906 CET127OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                  Host: checkip.dyndns.org
                                                                                  Dec 12, 2024 09:02:13.245096922 CET321INHTTP/1.1 200 OK
                                                                                  Date: Thu, 12 Dec 2024 08:02:13 GMT
                                                                                  Content-Type: text/html
                                                                                  Content-Length: 104
                                                                                  Connection: keep-alive
                                                                                  Cache-Control: no-cache
                                                                                  Pragma: no-cache
                                                                                  X-Request-ID: 132ddc2f4a5d26411024e669c9e16c74
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 37 35 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.175</body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.849705104.21.67.1524432156C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-12 08:02:15 UTC85OUTGET /xml/8.46.123.175 HTTP/1.1
                                                                                  Host: reallyfreegeoip.org
                                                                                  Connection: Keep-Alive
                                                                                  2024-12-12 08:02:15 UTC880INHTTP/1.1 200 OK
                                                                                  Date: Thu, 12 Dec 2024 08:02:15 GMT
                                                                                  Content-Type: text/xml
                                                                                  Content-Length: 362
                                                                                  Connection: close
                                                                                  Cache-Control: max-age=31536000
                                                                                  CF-Cache-Status: HIT
                                                                                  Age: 169858
                                                                                  Last-Modified: Tue, 10 Dec 2024 08:51:17 GMT
                                                                                  Accept-Ranges: bytes
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xFXUlsWDay%2FneoLT793%2Byd0cMfoBNGOsaatkyNWeXUyJQDJxKSY6Y0zC549HpSB%2BQ2aI6qbm8DsNocx7lrCf20lt8hkilZqs835kvnw1Sif%2BgVzoizYs4hYW%2F1rcrlAhkCt89Lo8"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8f0c30ee19ee435e-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1723&min_rtt=1722&rtt_var=649&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1682027&cwnd=240&unsent_bytes=0&cid=89ab744e03a733a7&ts=807&x=0"
                                                                                  2024-12-12 08:02:15 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 37 35 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                  Data Ascii: <Response><IP>8.46.123.175</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:03:02:08
                                                                                  Start date:12/12/2024
                                                                                  Path:C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe"
                                                                                  Imagebase:0x7ff663c40000
                                                                                  File size:666'699 bytes
                                                                                  MD5 hash:A27B87004E36C99C5AE138960F632287
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Target ID:2
                                                                                  Start time:03:02:08
                                                                                  Start date:12/12/2024
                                                                                  Path:C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe"
                                                                                  Imagebase:0x990000
                                                                                  File size:477'184 bytes
                                                                                  MD5 hash:F072A1E438C9D2453EE1B74027D07DD2
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.1449728784.0000000003D93000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.1449728784.0000000003C84000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  Antivirus matches:
                                                                                  • Detection: 100%, Avira
                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                  • Detection: 46%, Virustotal, Browse
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:03:02:09
                                                                                  Start date:12/12/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                  Imagebase:0xfa0000
                                                                                  File size:65'440 bytes
                                                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.2692802312.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2694976808.0000000003426000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:4
                                                                                  Start time:03:02:10
                                                                                  Start date:12/12/2024
                                                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\img.pdf"
                                                                                  Imagebase:0x7ff6e8200000
                                                                                  File size:5'641'176 bytes
                                                                                  MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:5
                                                                                  Start time:03:02:11
                                                                                  Start date:12/12/2024
                                                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                                                  Imagebase:0x7ff79c940000
                                                                                  File size:3'581'912 bytes
                                                                                  MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:7
                                                                                  Start time:03:02:11
                                                                                  Start date:12/12/2024
                                                                                  Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2056 --field-trial-handle=1664,i,10022418553164981674,7923153825484368479,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                                                  Imagebase:0x7ff79c940000
                                                                                  File size:3'581'912 bytes
                                                                                  MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:11.9%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:28.1%
                                                                                    Total number of Nodes:2000
                                                                                    Total number of Limit Nodes:30
                                                                                    execution_graph 25439 7ff663c72d6c 25464 7ff663c727fc 25439->25464 25442 7ff663c72eb8 25558 7ff663c73170 7 API calls 2 library calls 25442->25558 25443 7ff663c72d88 __scrt_acquire_startup_lock 25445 7ff663c72ec2 25443->25445 25447 7ff663c72da6 25443->25447 25559 7ff663c73170 7 API calls 2 library calls 25445->25559 25448 7ff663c72dcb 25447->25448 25452 7ff663c72de8 __scrt_release_startup_lock 25447->25452 25472 7ff663c7cd90 25447->25472 25450 7ff663c72ecd abort 25451 7ff663c72e51 25476 7ff663c732bc 25451->25476 25452->25451 25555 7ff663c7c050 35 API calls __GSHandlerCheck_EH 25452->25555 25454 7ff663c72e56 25479 7ff663c7cd20 25454->25479 25461 7ff663c72e79 25461->25450 25557 7ff663c72990 7 API calls __scrt_initialize_crt 25461->25557 25463 7ff663c72e90 25463->25448 25560 7ff663c72fb0 25464->25560 25467 7ff663c7282b 25562 7ff663c7cc50 25467->25562 25471 7ff663c72827 25471->25442 25471->25443 25473 7ff663c7cdeb 25472->25473 25474 7ff663c7cdcc 25472->25474 25473->25452 25474->25473 25579 7ff663c41120 25474->25579 25642 7ff663c73cf0 25476->25642 25644 7ff663c80730 25479->25644 25481 7ff663c7cd2f 25482 7ff663c72e5e 25481->25482 25648 7ff663c80ac0 35 API calls swprintf 25481->25648 25484 7ff663c70754 25482->25484 25650 7ff663c5dfd0 25484->25650 25488 7ff663c7079a 25737 7ff663c6946c 25488->25737 25490 7ff663c707a4 memcpy_s 25742 7ff663c69a14 25490->25742 25492 7ff663c70819 25493 7ff663c7096e GetCommandLineW 25492->25493 25543 7ff663c70ddc 25492->25543 25495 7ff663c70980 25493->25495 25535 7ff663c70b42 25493->25535 25494 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25496 7ff663c70de2 25494->25496 25802 7ff663c4129c 25495->25802 25797 7ff663c77904 25496->25797 25498 7ff663c70b51 25502 7ff663c41fa0 31 API calls 25498->25502 25509 7ff663c70b68 BuildCatchObjectHelperInternal 25498->25509 25502->25509 25504 7ff663c709a5 25812 7ff663c6cad0 102 API calls 3 library calls 25504->25812 25506 7ff663c70b93 SetEnvironmentVariableW GetLocalTime 25769 7ff663c53e28 25506->25769 25764 7ff663c41fa0 25509->25764 25512 7ff663c709af 25512->25496 25513 7ff663c70adb 25512->25513 25514 7ff663c709f9 OpenFileMappingW 25512->25514 25522 7ff663c4129c 33 API calls 25513->25522 25516 7ff663c70a19 MapViewOfFile 25514->25516 25517 7ff663c70ad0 CloseHandle 25514->25517 25516->25517 25519 7ff663c70a3f UnmapViewOfFile MapViewOfFile 25516->25519 25517->25535 25518 7ff663c70c5f 25789 7ff663c598ac 25518->25789 25519->25517 25523 7ff663c70a71 25519->25523 25521 7ff663c70c75 25794 7ff663c667b4 25521->25794 25525 7ff663c70b00 25522->25525 25813 7ff663c6a190 33 API calls 2 library calls 25523->25813 25817 7ff663c6fd0c 35 API calls 2 library calls 25525->25817 25529 7ff663c70a81 25814 7ff663c6fd0c 35 API calls 2 library calls 25529->25814 25530 7ff663c667b4 33 API calls 25533 7ff663c70c87 DialogBoxParamW 25530->25533 25531 7ff663c70b0a 25531->25535 25537 7ff663c70dd7 25531->25537 25542 7ff663c70cd3 25533->25542 25534 7ff663c70a90 25815 7ff663c5b9b4 102 API calls 25534->25815 25752 7ff663c56454 25535->25752 25540 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25537->25540 25538 7ff663c70aa5 25816 7ff663c5bb00 102 API calls 25538->25816 25540->25543 25541 7ff663c70ab8 25546 7ff663c70ac7 UnmapViewOfFile 25541->25546 25544 7ff663c70cec 25542->25544 25545 7ff663c70ce6 Sleep 25542->25545 25543->25494 25548 7ff663c70cfa 25544->25548 25818 7ff663c69f4c 49 API calls 2 library calls 25544->25818 25545->25544 25546->25517 25549 7ff663c70d5b 25548->25549 25552 7ff663c70d6d 25548->25552 25819 7ff663c6fe24 25549->25819 25825 7ff663c72320 25552->25825 25555->25451 25556 7ff663c73300 GetModuleHandleW 25556->25461 25557->25463 25558->25445 25559->25450 25561 7ff663c7281e __scrt_dllmain_crt_thread_attach 25560->25561 25561->25467 25561->25471 25563 7ff663c80d4c 25562->25563 25564 7ff663c72830 25563->25564 25567 7ff663c7ec00 25563->25567 25564->25471 25566 7ff663c751a0 7 API calls 2 library calls 25564->25566 25566->25471 25578 7ff663c7f398 EnterCriticalSection 25567->25578 25584 7ff663c491c8 25579->25584 25583 7ff663c72a01 25583->25474 25592 7ff663c556a4 25584->25592 25586 7ff663c491df 25595 7ff663c5b788 25586->25595 25590 7ff663c41130 25591 7ff663c729bc 34 API calls 25590->25591 25591->25583 25601 7ff663c556e8 25592->25601 25610 7ff663c413a4 25595->25610 25598 7ff663c49a28 25599 7ff663c556e8 2 API calls 25598->25599 25600 7ff663c49a36 25599->25600 25600->25590 25602 7ff663c556fe memcpy_s 25601->25602 25605 7ff663c5eba4 25602->25605 25608 7ff663c5eb58 GetCurrentProcess GetProcessAffinityMask 25605->25608 25609 7ff663c556de 25608->25609 25609->25586 25611 7ff663c413ad 25610->25611 25612 7ff663c4142d 25610->25612 25613 7ff663c4143d 25611->25613 25614 7ff663c413ce 25611->25614 25612->25598 25630 7ff663c42018 33 API calls std::_Xinvalid_argument 25613->25630 25618 7ff663c413db memcpy_s 25614->25618 25620 7ff663c721d0 25614->25620 25629 7ff663c4197c 31 API calls _invalid_parameter_noinfo_noreturn 25618->25629 25621 7ff663c721db 25620->25621 25622 7ff663c721f4 25621->25622 25624 7ff663c721fa 25621->25624 25631 7ff663c7bbc0 25621->25631 25622->25618 25625 7ff663c72205 25624->25625 25634 7ff663c72f7c RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 25624->25634 25635 7ff663c41f80 33 API calls 3 library calls 25625->25635 25628 7ff663c7220b 25629->25612 25636 7ff663c7bc00 25631->25636 25634->25625 25635->25628 25641 7ff663c7f398 EnterCriticalSection 25636->25641 25643 7ff663c732d3 GetStartupInfoW 25642->25643 25643->25454 25645 7ff663c8073d 25644->25645 25646 7ff663c80749 25644->25646 25649 7ff663c80570 48 API calls 5 library calls 25645->25649 25646->25481 25648->25481 25649->25646 25834 7ff663c72450 25650->25834 25653 7ff663c5e07b 25655 7ff663c5e503 25653->25655 25867 7ff663c7b788 39 API calls _snwprintf 25653->25867 25654 7ff663c5e026 GetProcAddress 25656 7ff663c5e03b 25654->25656 25657 7ff663c5e053 GetProcAddress 25654->25657 25658 7ff663c56454 34 API calls 25655->25658 25656->25657 25657->25653 25659 7ff663c5e068 25657->25659 25661 7ff663c5e50c 25658->25661 25659->25653 25836 7ff663c57df4 25661->25836 25662 7ff663c5e3b0 25662->25655 25664 7ff663c5e3ba 25662->25664 25665 7ff663c56454 34 API calls 25664->25665 25666 7ff663c5e3c3 CreateFileW 25665->25666 25668 7ff663c5e403 SetFilePointer 25666->25668 25669 7ff663c5e4f0 CloseHandle 25666->25669 25668->25669 25670 7ff663c5e41c ReadFile 25668->25670 25671 7ff663c41fa0 31 API calls 25669->25671 25670->25669 25672 7ff663c5e444 25670->25672 25671->25655 25673 7ff663c5e458 25672->25673 25674 7ff663c5e800 25672->25674 25679 7ff663c4129c 33 API calls 25673->25679 25883 7ff663c72624 8 API calls 25674->25883 25676 7ff663c5e805 25677 7ff663c5e53e CompareStringW 25682 7ff663c5e51a 25677->25682 25678 7ff663c4129c 33 API calls 25678->25682 25681 7ff663c5e48f 25679->25681 25688 7ff663c5e4db 25681->25688 25868 7ff663c5d0a0 33 API calls 25681->25868 25682->25677 25682->25678 25683 7ff663c41fa0 31 API calls 25682->25683 25711 7ff663c5e5cc 25682->25711 25844 7ff663c551a4 25682->25844 25849 7ff663c58090 25682->25849 25853 7ff663c532bc 25682->25853 25683->25682 25685 7ff663c5e648 25869 7ff663c57eb0 47 API calls 25685->25869 25686 7ff663c5e7c2 25690 7ff663c41fa0 31 API calls 25686->25690 25691 7ff663c41fa0 31 API calls 25688->25691 25693 7ff663c5e7cb 25690->25693 25695 7ff663c5e4e5 25691->25695 25692 7ff663c5e651 25696 7ff663c551a4 9 API calls 25692->25696 25694 7ff663c41fa0 31 API calls 25693->25694 25698 7ff663c5e7d5 25694->25698 25699 7ff663c41fa0 31 API calls 25695->25699 25700 7ff663c5e656 25696->25700 25697 7ff663c4129c 33 API calls 25697->25711 25703 7ff663c72320 _handle_error 8 API calls 25698->25703 25699->25669 25701 7ff663c5e706 25700->25701 25708 7ff663c5e661 25700->25708 25704 7ff663c5da98 48 API calls 25701->25704 25702 7ff663c58090 47 API calls 25702->25711 25705 7ff663c5e7e4 25703->25705 25706 7ff663c5e74b AllocConsole 25704->25706 25727 7ff663c562dc GetCurrentDirectoryW 25705->25727 25709 7ff663c5e755 GetCurrentProcessId AttachConsole 25706->25709 25710 7ff663c5e6fb 25706->25710 25707 7ff663c41fa0 31 API calls 25707->25711 25870 7ff663c5aae0 25708->25870 25712 7ff663c5e76c 25709->25712 25882 7ff663c419e0 31 API calls _invalid_parameter_noinfo_noreturn 25710->25882 25711->25697 25711->25702 25711->25707 25713 7ff663c532bc 51 API calls 25711->25713 25717 7ff663c5e63a 25711->25717 25720 7ff663c5e778 GetStdHandle WriteConsoleW Sleep FreeConsole 25712->25720 25713->25711 25717->25685 25717->25686 25718 7ff663c5e7b9 ExitProcess 25720->25710 25722 7ff663c5aae0 48 API calls 25723 7ff663c5e6ce 25722->25723 25880 7ff663c5dc2c 33 API calls 25723->25880 25725 7ff663c5e6da 25881 7ff663c419e0 31 API calls _invalid_parameter_noinfo_noreturn 25725->25881 25728 7ff663c56300 25727->25728 25734 7ff663c5638d 25727->25734 25729 7ff663c413a4 33 API calls 25728->25729 25730 7ff663c5631b GetCurrentDirectoryW 25729->25730 25731 7ff663c56341 25730->25731 26123 7ff663c420b0 25731->26123 25733 7ff663c5634f 25733->25734 25735 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25733->25735 25734->25488 25736 7ff663c563a9 25735->25736 25738 7ff663c5dd88 25737->25738 25739 7ff663c69481 OleInitialize 25738->25739 25740 7ff663c694a7 25739->25740 25741 7ff663c694cd SHGetMalloc 25740->25741 25741->25490 25743 7ff663c69a49 25742->25743 25746 7ff663c69a4e BuildCatchObjectHelperInternal 25742->25746 25744 7ff663c41fa0 31 API calls 25743->25744 25744->25746 25745 7ff663c69a7d BuildCatchObjectHelperInternal 25748 7ff663c41fa0 31 API calls 25745->25748 25749 7ff663c69aac BuildCatchObjectHelperInternal 25745->25749 25746->25745 25747 7ff663c41fa0 31 API calls 25746->25747 25747->25745 25748->25749 25750 7ff663c41fa0 31 API calls 25749->25750 25751 7ff663c69adb BuildCatchObjectHelperInternal 25749->25751 25750->25751 25751->25492 25753 7ff663c413a4 33 API calls 25752->25753 25754 7ff663c56489 25753->25754 25755 7ff663c5648c GetModuleFileNameW 25754->25755 25758 7ff663c564dc 25754->25758 25756 7ff663c564a7 25755->25756 25757 7ff663c564de 25755->25757 25756->25754 25757->25758 25759 7ff663c4129c 33 API calls 25758->25759 25761 7ff663c56506 25759->25761 25760 7ff663c5653e 25760->25498 25761->25760 25762 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25761->25762 25763 7ff663c56560 25762->25763 25765 7ff663c41fdc 25764->25765 25766 7ff663c41fb3 25764->25766 25765->25506 25766->25765 25767 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25766->25767 25768 7ff663c42000 25767->25768 25770 7ff663c53e4d _snwprintf 25769->25770 25771 7ff663c79ef0 swprintf 46 API calls 25770->25771 25772 7ff663c53e69 SetEnvironmentVariableW GetModuleHandleW LoadIconW 25771->25772 25773 7ff663c6b014 LoadBitmapW 25772->25773 25774 7ff663c6b046 25773->25774 25775 7ff663c6b03e 25773->25775 25777 7ff663c6b063 25774->25777 25778 7ff663c6b04e GetObjectW 25774->25778 26128 7ff663c68624 FindResourceW 25775->26128 26143 7ff663c6849c 25777->26143 25778->25777 25781 7ff663c6b0bf 25781->25518 25783 7ff663c68624 11 API calls 25785 7ff663c6b08a 25783->25785 25784 7ff663c6b0a7 26149 7ff663c684cc 25784->26149 26148 7ff663c68504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25785->26148 26156 7ff663c598dc 25789->26156 25791 7ff663c598ba 26223 7ff663c5a43c GetModuleHandleW FindResourceW 25791->26223 25793 7ff663c598c2 25793->25521 25795 7ff663c721d0 33 API calls 25794->25795 25796 7ff663c667fa 25795->25796 25796->25530 26305 7ff663c7783c 31 API calls 2 library calls 25797->26305 25799 7ff663c7791d 26306 7ff663c77934 16 API calls abort 25799->26306 25803 7ff663c412d0 25802->25803 25809 7ff663c4139b 25802->25809 25806 7ff663c41338 25803->25806 25807 7ff663c41396 25803->25807 25811 7ff663c412de BuildCatchObjectHelperInternal 25803->25811 25810 7ff663c721d0 33 API calls 25806->25810 25806->25811 26307 7ff663c41f80 33 API calls 3 library calls 25807->26307 26308 7ff663c42004 33 API calls std::_Xinvalid_argument 25809->26308 25810->25811 25811->25504 25812->25512 25813->25529 25814->25534 25815->25538 25816->25541 25817->25531 25818->25548 25820 7ff663c6fe77 WaitForSingleObject 25819->25820 25821 7ff663c6fe89 CloseHandle 25820->25821 25822 7ff663c6fe2f PeekMessageW 25820->25822 25821->25552 25823 7ff663c6fe4b GetMessageW TranslateMessage DispatchMessageW 25822->25823 25824 7ff663c6fe74 25822->25824 25823->25824 25824->25820 25827 7ff663c72329 25825->25827 25826 7ff663c70dba 25826->25556 25827->25826 25828 7ff663c72550 IsProcessorFeaturePresent 25827->25828 25829 7ff663c72568 25828->25829 26309 7ff663c72744 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 25829->26309 25831 7ff663c7257b 26310 7ff663c72510 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25831->26310 25835 7ff663c5dff4 GetModuleHandleW 25834->25835 25835->25653 25835->25654 25837 7ff663c57e0c 25836->25837 25838 7ff663c57e23 25837->25838 25839 7ff663c57e55 25837->25839 25841 7ff663c4129c 33 API calls 25838->25841 25884 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 25839->25884 25843 7ff663c57e47 25841->25843 25842 7ff663c57e5a 25843->25682 25845 7ff663c551c8 GetVersionExW 25844->25845 25846 7ff663c551fb 25844->25846 25845->25846 25847 7ff663c72320 _handle_error 8 API calls 25846->25847 25848 7ff663c55228 25847->25848 25848->25682 25850 7ff663c580a5 25849->25850 25885 7ff663c58188 25850->25885 25852 7ff663c580ca 25852->25682 25854 7ff663c532e7 GetFileAttributesW 25853->25854 25855 7ff663c532e4 25853->25855 25856 7ff663c532f8 25854->25856 25863 7ff663c53375 25854->25863 25855->25854 25894 7ff663c56a0c 25856->25894 25857 7ff663c72320 _handle_error 8 API calls 25860 7ff663c53389 25857->25860 25860->25682 25861 7ff663c5333c 25861->25863 25864 7ff663c53399 25861->25864 25862 7ff663c53323 GetFileAttributesW 25862->25861 25863->25857 25865 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25864->25865 25866 7ff663c5339e 25865->25866 25867->25662 25868->25681 25869->25692 25871 7ff663c5aaf3 25870->25871 26024 7ff663c59774 25871->26024 25874 7ff663c5ab86 25877 7ff663c5da98 25874->25877 25875 7ff663c5ab58 LoadStringW 25875->25874 25876 7ff663c5ab71 LoadStringW 25875->25876 25876->25874 26050 7ff663c5d874 25877->26050 25880->25725 25881->25710 25882->25718 25883->25676 25884->25842 25886 7ff663c58326 25885->25886 25889 7ff663c581ba 25885->25889 25893 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 25886->25893 25888 7ff663c5832b 25891 7ff663c581d4 BuildCatchObjectHelperInternal 25889->25891 25892 7ff663c558a4 33 API calls 2 library calls 25889->25892 25891->25852 25892->25891 25893->25888 25895 7ff663c56a4b 25894->25895 25896 7ff663c56a44 25894->25896 25898 7ff663c4129c 33 API calls 25895->25898 25897 7ff663c72320 _handle_error 8 API calls 25896->25897 25899 7ff663c5331f 25897->25899 25900 7ff663c56a76 25898->25900 25899->25861 25899->25862 25901 7ff663c56a96 25900->25901 25902 7ff663c56cc7 25900->25902 25904 7ff663c56ab0 25901->25904 25923 7ff663c56b49 25901->25923 25903 7ff663c562dc 35 API calls 25902->25903 25906 7ff663c56ce6 25903->25906 25933 7ff663c570ab 25904->25933 25967 7ff663c4c098 25904->25967 25905 7ff663c56eef 25911 7ff663c4c098 33 API calls 25905->25911 25950 7ff663c570cf 25905->25950 25906->25905 25912 7ff663c56d1b 25906->25912 25966 7ff663c56b44 25906->25966 25909 7ff663c570b1 25916 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25909->25916 25910 7ff663c56b03 25925 7ff663c41fa0 31 API calls 25910->25925 25931 7ff663c56b15 BuildCatchObjectHelperInternal 25910->25931 25919 7ff663c56f56 25911->25919 25913 7ff663c570bd 25912->25913 25921 7ff663c4c098 33 API calls 25912->25921 26013 7ff663c42004 33 API calls std::_Xinvalid_argument 25913->26013 25914 7ff663c570d5 25917 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25914->25917 25922 7ff663c570b7 25916->25922 25924 7ff663c570db 25917->25924 25918 7ff663c570a6 25929 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25918->25929 26010 7ff663c411cc 33 API calls BuildCatchObjectHelperInternal 25919->26010 25944 7ff663c56d76 BuildCatchObjectHelperInternal 25921->25944 25934 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25922->25934 25930 7ff663c4129c 33 API calls 25923->25930 25923->25966 25936 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25924->25936 25925->25931 25927 7ff663c570c3 25939 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 25927->25939 25928 7ff663c41fa0 31 API calls 25928->25966 25929->25933 25937 7ff663c56bbe 25930->25937 25931->25928 25932 7ff663c56f69 26011 7ff663c557ac 33 API calls BuildCatchObjectHelperInternal 25932->26011 26012 7ff663c42004 33 API calls std::_Xinvalid_argument 25933->26012 25934->25913 25935 7ff663c41fa0 31 API calls 25949 7ff663c56df5 25935->25949 25940 7ff663c570e1 25936->25940 25975 7ff663c55820 25937->25975 25942 7ff663c570c9 25939->25942 26014 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 25942->26014 25944->25927 25944->25935 25945 7ff663c41fa0 31 API calls 25948 7ff663c56fec 25945->25948 25951 7ff663c41fa0 31 API calls 25948->25951 25955 7ff663c56e21 25949->25955 25993 7ff663c41744 25949->25993 26015 7ff663c42004 33 API calls std::_Xinvalid_argument 25950->26015 25954 7ff663c56ff6 25951->25954 25952 7ff663c56f79 BuildCatchObjectHelperInternal 25952->25924 25952->25945 25953 7ff663c41fa0 31 API calls 25957 7ff663c56c6d 25953->25957 25958 7ff663c41fa0 31 API calls 25954->25958 25955->25942 25959 7ff663c4129c 33 API calls 25955->25959 25960 7ff663c41fa0 31 API calls 25957->25960 25958->25966 25961 7ff663c56ec2 25959->25961 25960->25966 26006 7ff663c42034 25961->26006 25962 7ff663c56be9 BuildCatchObjectHelperInternal 25962->25922 25962->25953 25964 7ff663c56edf 25965 7ff663c41fa0 31 API calls 25964->25965 25965->25966 25966->25896 25966->25909 25966->25914 25966->25918 25968 7ff663c4c0e5 25967->25968 25973 7ff663c4c0fa BuildCatchObjectHelperInternal 25967->25973 25969 7ff663c4c12c 25968->25969 25970 7ff663c4c1a5 25968->25970 25968->25973 25969->25973 25974 7ff663c721d0 33 API calls 25969->25974 26016 7ff663c41f80 33 API calls 3 library calls 25970->26016 25972 7ff663c4c1aa 25973->25910 25974->25973 25976 7ff663c55849 25975->25976 25977 7ff663c5585b 25976->25977 25978 7ff663c5589e 25976->25978 25981 7ff663c4c098 33 API calls 25977->25981 26017 7ff663c42004 33 API calls std::_Xinvalid_argument 25978->26017 25982 7ff663c55886 25981->25982 25983 7ff663c4e164 25982->25983 25986 7ff663c4e1b2 25983->25986 25984 7ff663c4e345 26019 7ff663c42004 33 API calls std::_Xinvalid_argument 25984->26019 25986->25984 25987 7ff663c4e2bc 25986->25987 25988 7ff663c4e340 25986->25988 25992 7ff663c4e1b8 BuildCatchObjectHelperInternal 25986->25992 25991 7ff663c721d0 33 API calls 25987->25991 25987->25992 26018 7ff663c41f80 33 API calls 3 library calls 25988->26018 25991->25992 25992->25962 25996 7ff663c41784 25993->25996 26005 7ff663c418a1 25993->26005 25995 7ff663c418a7 26021 7ff663c41f80 33 API calls 3 library calls 25995->26021 25996->25995 25999 7ff663c721d0 33 API calls 25996->25999 26002 7ff663c417ac BuildCatchObjectHelperInternal 25996->26002 25998 7ff663c418ad 26022 7ff663c7354c 31 API calls __std_exception_copy 25998->26022 25999->26002 26000 7ff663c41859 BuildCatchObjectHelperInternal 26000->25955 26002->26000 26004 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26002->26004 26003 7ff663c418d9 26003->25955 26004->26005 26020 7ff663c42004 33 API calls std::_Xinvalid_argument 26005->26020 26007 7ff663c42085 26006->26007 26009 7ff663c42059 BuildCatchObjectHelperInternal 26006->26009 26023 7ff663c415b8 33 API calls 3 library calls 26007->26023 26009->25964 26010->25932 26011->25952 26014->25950 26016->25972 26018->25984 26021->25998 26022->26003 26023->26009 26031 7ff663c59638 26024->26031 26028 7ff663c597d9 26029 7ff663c72320 _handle_error 8 API calls 26028->26029 26030 7ff663c597f2 26029->26030 26030->25874 26030->25875 26032 7ff663c59692 26031->26032 26033 7ff663c59730 26031->26033 26037 7ff663c596c0 26032->26037 26045 7ff663c60f68 WideCharToMultiByte 26032->26045 26035 7ff663c72320 _handle_error 8 API calls 26033->26035 26036 7ff663c59764 26035->26036 26036->26028 26041 7ff663c59800 26036->26041 26040 7ff663c596ef 26037->26040 26047 7ff663c5aa88 45 API calls _snwprintf 26037->26047 26048 7ff663c7a270 31 API calls 2 library calls 26040->26048 26042 7ff663c59840 26041->26042 26044 7ff663c59869 26041->26044 26049 7ff663c7a270 31 API calls 2 library calls 26042->26049 26044->26028 26046 7ff663c60faa 26045->26046 26046->26037 26047->26040 26048->26033 26049->26044 26066 7ff663c5d4d0 26050->26066 26055 7ff663c5d9a3 26057 7ff663c5da17 26055->26057 26060 7ff663c5da3f 26055->26060 26056 7ff663c5d8e5 _snwprintf 26063 7ff663c5d974 26056->26063 26080 7ff663c79ef0 26056->26080 26107 7ff663c49d78 33 API calls 26056->26107 26059 7ff663c72320 _handle_error 8 API calls 26057->26059 26061 7ff663c5da2b 26059->26061 26062 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26060->26062 26061->25722 26064 7ff663c5da44 26062->26064 26063->26055 26108 7ff663c49d78 33 API calls 26063->26108 26067 7ff663c5d665 26066->26067 26069 7ff663c5d502 26066->26069 26070 7ff663c5cb80 26067->26070 26068 7ff663c41744 33 API calls 26068->26069 26069->26067 26069->26068 26071 7ff663c5cbb6 26070->26071 26078 7ff663c5cc80 26070->26078 26074 7ff663c5cc7b 26071->26074 26075 7ff663c5cc20 26071->26075 26076 7ff663c5cbc6 26071->26076 26109 7ff663c41f80 33 API calls 3 library calls 26074->26109 26075->26076 26079 7ff663c721d0 33 API calls 26075->26079 26076->26056 26110 7ff663c42004 33 API calls std::_Xinvalid_argument 26078->26110 26079->26076 26081 7ff663c79f36 26080->26081 26082 7ff663c79f4e 26080->26082 26111 7ff663c7d69c 15 API calls _invalid_parameter_noinfo 26081->26111 26082->26081 26084 7ff663c79f58 26082->26084 26113 7ff663c77ef0 35 API calls 2 library calls 26084->26113 26085 7ff663c79f3b 26112 7ff663c778e4 31 API calls _invalid_parameter_noinfo 26085->26112 26088 7ff663c79f69 memcpy_s 26114 7ff663c77e70 15 API calls _set_fmode 26088->26114 26089 7ff663c72320 _handle_error 8 API calls 26090 7ff663c7a10b 26089->26090 26090->26056 26092 7ff663c79fd4 26115 7ff663c782f8 46 API calls 3 library calls 26092->26115 26094 7ff663c79fdd 26095 7ff663c79fe5 26094->26095 26096 7ff663c7a014 26094->26096 26116 7ff663c7d90c 26095->26116 26098 7ff663c7a06c 26096->26098 26099 7ff663c7a023 26096->26099 26100 7ff663c7a092 26096->26100 26103 7ff663c7a01a 26096->26103 26104 7ff663c7d90c __free_lconv_num 15 API calls 26098->26104 26102 7ff663c7d90c __free_lconv_num 15 API calls 26099->26102 26100->26098 26101 7ff663c7a09c 26100->26101 26105 7ff663c7d90c __free_lconv_num 15 API calls 26101->26105 26106 7ff663c79f46 26102->26106 26103->26098 26103->26099 26104->26106 26105->26106 26106->26089 26107->26056 26108->26055 26109->26078 26111->26085 26112->26106 26113->26088 26114->26092 26115->26094 26117 7ff663c7d911 RtlFreeHeap 26116->26117 26121 7ff663c7d941 __free_lconv_num 26116->26121 26118 7ff663c7d92c 26117->26118 26117->26121 26122 7ff663c7d69c 15 API calls _invalid_parameter_noinfo 26118->26122 26120 7ff663c7d931 GetLastError 26120->26121 26121->26106 26122->26120 26124 7ff663c420f6 26123->26124 26126 7ff663c420cb BuildCatchObjectHelperInternal 26123->26126 26127 7ff663c41474 33 API calls 3 library calls 26124->26127 26126->25733 26127->26126 26129 7ff663c6879b 26128->26129 26130 7ff663c6864f SizeofResource 26128->26130 26129->25774 26130->26129 26131 7ff663c68669 LoadResource 26130->26131 26131->26129 26132 7ff663c68682 LockResource 26131->26132 26132->26129 26133 7ff663c68697 GlobalAlloc 26132->26133 26133->26129 26134 7ff663c686b8 GlobalLock 26133->26134 26135 7ff663c686ca BuildCatchObjectHelperInternal 26134->26135 26136 7ff663c68792 GlobalFree 26134->26136 26137 7ff663c686d8 CreateStreamOnHGlobal 26135->26137 26136->26129 26138 7ff663c68789 GlobalUnlock 26137->26138 26139 7ff663c686f6 GdipAlloc 26137->26139 26138->26136 26140 7ff663c6870b 26139->26140 26140->26138 26141 7ff663c6875a GdipCreateHBITMAPFromBitmap 26140->26141 26142 7ff663c68772 26140->26142 26141->26142 26142->26138 26144 7ff663c684cc 4 API calls 26143->26144 26145 7ff663c684aa 26144->26145 26147 7ff663c684b9 26145->26147 26154 7ff663c68504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26145->26154 26147->25781 26147->25783 26147->25785 26148->25784 26150 7ff663c684e3 26149->26150 26151 7ff663c684de 26149->26151 26153 7ff663c68df4 15 API calls _handle_error 26150->26153 26155 7ff663c68590 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26151->26155 26153->25781 26154->26147 26155->26150 26159 7ff663c598fe _snwprintf 26156->26159 26157 7ff663c59973 26274 7ff663c568b0 48 API calls 26157->26274 26159->26157 26160 7ff663c59a89 26159->26160 26163 7ff663c599fd 26160->26163 26165 7ff663c420b0 33 API calls 26160->26165 26161 7ff663c41fa0 31 API calls 26161->26163 26162 7ff663c5997d BuildCatchObjectHelperInternal 26162->26161 26164 7ff663c5a42e 26162->26164 26225 7ff663c524c0 26163->26225 26166 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26164->26166 26165->26163 26168 7ff663c5a434 26166->26168 26170 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26168->26170 26172 7ff663c5a43a 26170->26172 26171 7ff663c59a22 26174 7ff663c5204c 100 API calls 26171->26174 26173 7ff663c59b17 26243 7ff663c7a450 26173->26243 26176 7ff663c59a2b 26174->26176 26176->26168 26179 7ff663c59a66 26176->26179 26178 7ff663c59aad 26178->26173 26180 7ff663c58e58 33 API calls 26178->26180 26182 7ff663c72320 _handle_error 8 API calls 26179->26182 26180->26178 26181 7ff663c7a450 31 API calls 26194 7ff663c59b57 __vcrt_InitializeCriticalSectionEx 26181->26194 26183 7ff663c5a40e 26182->26183 26183->25791 26184 7ff663c59c89 26185 7ff663c52aa0 101 API calls 26184->26185 26197 7ff663c59d5c 26184->26197 26188 7ff663c59ca1 26185->26188 26191 7ff663c528d0 104 API calls 26188->26191 26188->26197 26195 7ff663c59cc9 26191->26195 26194->26184 26194->26197 26251 7ff663c52bb0 26194->26251 26260 7ff663c528d0 26194->26260 26265 7ff663c52aa0 26194->26265 26195->26197 26217 7ff663c59cd7 __vcrt_InitializeCriticalSectionEx 26195->26217 26275 7ff663c60bbc MultiByteToWideChar 26195->26275 26270 7ff663c5204c 26197->26270 26198 7ff663c5a1ec 26207 7ff663c5a2c2 26198->26207 26281 7ff663c7cf90 31 API calls 2 library calls 26198->26281 26200 7ff663c5a157 26200->26198 26278 7ff663c7cf90 31 API calls 2 library calls 26200->26278 26201 7ff663c5a14b 26201->25791 26204 7ff663c5a249 26282 7ff663c7b7bc 31 API calls _invalid_parameter_noinfo_noreturn 26204->26282 26205 7ff663c5a3a2 26208 7ff663c7a450 31 API calls 26205->26208 26206 7ff663c5a2ae 26206->26207 26283 7ff663c58cd0 33 API calls 2 library calls 26206->26283 26207->26205 26209 7ff663c58e58 33 API calls 26207->26209 26211 7ff663c5a3cb 26208->26211 26209->26207 26212 7ff663c7a450 31 API calls 26211->26212 26212->26197 26214 7ff663c5a16d 26279 7ff663c7b7bc 31 API calls _invalid_parameter_noinfo_noreturn 26214->26279 26215 7ff663c5a1d8 26215->26198 26280 7ff663c58cd0 33 API calls 2 library calls 26215->26280 26217->26197 26217->26198 26217->26200 26217->26201 26218 7ff663c5a429 26217->26218 26220 7ff663c60f68 WideCharToMultiByte 26217->26220 26276 7ff663c5aa88 45 API calls _snwprintf 26217->26276 26277 7ff663c7a270 31 API calls 2 library calls 26217->26277 26284 7ff663c72624 8 API calls 26218->26284 26220->26217 26224 7ff663c5a468 26223->26224 26224->25793 26226 7ff663c524fd CreateFileW 26225->26226 26228 7ff663c525ae GetLastError 26226->26228 26237 7ff663c5266e 26226->26237 26229 7ff663c56a0c 49 API calls 26228->26229 26230 7ff663c525dc 26229->26230 26231 7ff663c525e0 CreateFileW GetLastError 26230->26231 26236 7ff663c5262c 26230->26236 26231->26236 26232 7ff663c526b1 SetFileTime 26235 7ff663c526cf 26232->26235 26233 7ff663c52708 26234 7ff663c72320 _handle_error 8 API calls 26233->26234 26238 7ff663c5271b 26234->26238 26235->26233 26239 7ff663c420b0 33 API calls 26235->26239 26236->26237 26240 7ff663c52736 26236->26240 26237->26232 26237->26235 26238->26171 26238->26178 26239->26233 26241 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26240->26241 26242 7ff663c5273b 26241->26242 26244 7ff663c7a47d 26243->26244 26250 7ff663c7a492 26244->26250 26285 7ff663c7d69c 15 API calls _invalid_parameter_noinfo 26244->26285 26246 7ff663c7a487 26286 7ff663c778e4 31 API calls _invalid_parameter_noinfo 26246->26286 26248 7ff663c72320 _handle_error 8 API calls 26249 7ff663c59b37 26248->26249 26249->26181 26250->26248 26252 7ff663c52be9 26251->26252 26253 7ff663c52bcd 26251->26253 26254 7ff663c52c01 SetFilePointer 26252->26254 26256 7ff663c52bfb 26252->26256 26253->26256 26287 7ff663c4b9c4 99 API calls Concurrency::cancel_current_task 26253->26287 26254->26256 26257 7ff663c52c1e GetLastError 26254->26257 26256->26194 26257->26256 26258 7ff663c52c28 26257->26258 26258->26256 26288 7ff663c4b9c4 99 API calls Concurrency::cancel_current_task 26258->26288 26261 7ff663c528f6 26260->26261 26263 7ff663c528fd 26260->26263 26261->26194 26263->26261 26264 7ff663c52320 GetStdHandle ReadFile GetLastError GetLastError GetFileType 26263->26264 26289 7ff663c4b8a4 99 API calls Concurrency::cancel_current_task 26263->26289 26264->26263 26290 7ff663c52778 26265->26290 26267 7ff663c52ac7 26267->26194 26271 7ff663c52066 26270->26271 26272 7ff663c52072 26270->26272 26271->26272 26298 7ff663c520d0 26271->26298 26274->26162 26275->26217 26276->26217 26277->26217 26278->26214 26279->26215 26280->26198 26281->26204 26282->26206 26283->26207 26284->26164 26285->26246 26286->26250 26296 7ff663c52789 _snwprintf 26290->26296 26291 7ff663c72320 _handle_error 8 API calls 26294 7ff663c5281d 26291->26294 26292 7ff663c527b5 26292->26291 26293 7ff663c52890 SetFilePointer 26293->26292 26295 7ff663c528b8 GetLastError 26293->26295 26294->26267 26297 7ff663c4b9c4 99 API calls Concurrency::cancel_current_task 26294->26297 26295->26292 26296->26292 26296->26293 26299 7ff663c520ea 26298->26299 26301 7ff663c52102 26298->26301 26299->26301 26302 7ff663c520f6 CloseHandle 26299->26302 26300 7ff663c52126 26300->26272 26301->26300 26304 7ff663c4b544 99 API calls 26301->26304 26302->26301 26304->26300 26305->25799 26307->25809 26309->25831 26311 7ff663c7d94c 26312 7ff663c7d997 26311->26312 26316 7ff663c7d95b _invalid_parameter_noinfo 26311->26316 26318 7ff663c7d69c 15 API calls _invalid_parameter_noinfo 26312->26318 26313 7ff663c7d97e HeapAlloc 26315 7ff663c7d995 26313->26315 26313->26316 26316->26312 26316->26313 26317 7ff663c7bbc0 _invalid_parameter_noinfo 2 API calls 26316->26317 26317->26316 26318->26315 26319 7ff663c71552 26320 7ff663c714a2 26319->26320 26322 7ff663c71900 26320->26322 26348 7ff663c71558 26322->26348 26325 7ff663c7198b 26326 7ff663c71868 DloadReleaseSectionWriteAccess 6 API calls 26325->26326 26327 7ff663c71998 RaiseException 26326->26327 26328 7ff663c71bb5 26327->26328 26328->26320 26329 7ff663c71a3d LoadLibraryExA 26330 7ff663c71aa9 26329->26330 26331 7ff663c71a54 GetLastError 26329->26331 26334 7ff663c71abd 26330->26334 26337 7ff663c71ab4 FreeLibrary 26330->26337 26335 7ff663c71a69 26331->26335 26336 7ff663c71a7e 26331->26336 26332 7ff663c71b85 26356 7ff663c71868 26332->26356 26333 7ff663c71b1b GetProcAddress 26333->26332 26341 7ff663c71b30 GetLastError 26333->26341 26334->26332 26334->26333 26335->26330 26335->26336 26340 7ff663c71868 DloadReleaseSectionWriteAccess 6 API calls 26336->26340 26337->26334 26338 7ff663c719b4 26338->26329 26338->26330 26338->26332 26338->26334 26342 7ff663c71a8b RaiseException 26340->26342 26343 7ff663c71b45 26341->26343 26342->26328 26343->26332 26344 7ff663c71868 DloadReleaseSectionWriteAccess 6 API calls 26343->26344 26345 7ff663c71b67 RaiseException 26344->26345 26346 7ff663c71558 _com_raise_error 6 API calls 26345->26346 26347 7ff663c71b81 26346->26347 26347->26332 26349 7ff663c7156e 26348->26349 26355 7ff663c715d3 26348->26355 26364 7ff663c71604 26349->26364 26352 7ff663c715ce 26354 7ff663c71604 DloadReleaseSectionWriteAccess 3 API calls 26352->26354 26354->26355 26355->26325 26355->26338 26357 7ff663c71878 26356->26357 26358 7ff663c718d1 26356->26358 26359 7ff663c71604 DloadReleaseSectionWriteAccess 3 API calls 26357->26359 26358->26328 26360 7ff663c7187d 26359->26360 26361 7ff663c718cc 26360->26361 26362 7ff663c717d8 DloadProtectSection 3 API calls 26360->26362 26363 7ff663c71604 DloadReleaseSectionWriteAccess 3 API calls 26361->26363 26362->26361 26363->26358 26365 7ff663c71573 26364->26365 26366 7ff663c7161f 26364->26366 26365->26352 26371 7ff663c717d8 26365->26371 26366->26365 26367 7ff663c71624 GetModuleHandleW 26366->26367 26368 7ff663c7163e GetProcAddress 26367->26368 26370 7ff663c71639 26367->26370 26369 7ff663c71653 GetProcAddress 26368->26369 26368->26370 26369->26370 26370->26365 26374 7ff663c717fa DloadProtectSection 26371->26374 26372 7ff663c71802 26372->26352 26373 7ff663c7183a VirtualProtect 26373->26372 26374->26372 26374->26373 26376 7ff663c716a4 VirtualQuery GetSystemInfo 26374->26376 26376->26373 26377 7ff663c720f0 26378 7ff663c72106 _com_error::_com_error 26377->26378 26383 7ff663c74078 26378->26383 26380 7ff663c72117 26381 7ff663c71900 _com_raise_error 14 API calls 26380->26381 26382 7ff663c72163 26381->26382 26384 7ff663c740b4 RtlPcToFileHeader 26383->26384 26385 7ff663c74097 26383->26385 26386 7ff663c740cc 26384->26386 26387 7ff663c740db RaiseException 26384->26387 26385->26384 26386->26387 26387->26380 26388 7ff663c703e0 26389 7ff663c70497 26388->26389 26390 7ff663c7041f 26388->26390 26392 7ff663c5aae0 48 API calls 26389->26392 26391 7ff663c5aae0 48 API calls 26390->26391 26393 7ff663c70433 26391->26393 26394 7ff663c704ab 26392->26394 26396 7ff663c5da98 48 API calls 26393->26396 26395 7ff663c5da98 48 API calls 26394->26395 26400 7ff663c70442 BuildCatchObjectHelperInternal 26395->26400 26396->26400 26397 7ff663c41fa0 31 API calls 26398 7ff663c70541 26397->26398 26413 7ff663c4250c 26398->26413 26399 7ff663c705cc 26403 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26399->26403 26400->26397 26400->26399 26412 7ff663c705c6 26400->26412 26402 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26402->26399 26405 7ff663c705d2 26403->26405 26412->26402 26414 7ff663c42516 SetDlgItemTextW 26413->26414 26415 7ff663c42513 26413->26415 26415->26414 26416 7ff663c6b190 26752 7ff663c4255c 26416->26752 26418 7ff663c6b1db 26419 7ff663c6be93 26418->26419 26420 7ff663c6b1ef 26418->26420 26573 7ff663c6b20c 26418->26573 26994 7ff663c6f390 26419->26994 26423 7ff663c6b2db 26420->26423 26424 7ff663c6b1ff 26420->26424 26420->26573 26429 7ff663c6b391 26423->26429 26433 7ff663c6b2f5 26423->26433 26435 7ff663c5aae0 48 API calls 26424->26435 26424->26573 26425 7ff663c72320 _handle_error 8 API calls 26428 7ff663c6c350 26425->26428 26426 7ff663c6beba SendMessageW 26427 7ff663c6bec9 26426->26427 26431 7ff663c6bed5 SendDlgItemMessageW 26427->26431 26432 7ff663c6bef0 GetDlgItem SendMessageW 26427->26432 26760 7ff663c422bc GetDlgItem 26429->26760 26431->26432 26436 7ff663c562dc 35 API calls 26432->26436 26437 7ff663c5aae0 48 API calls 26433->26437 26438 7ff663c6b236 26435->26438 26439 7ff663c6bf47 GetDlgItem 26436->26439 26440 7ff663c6b313 SetDlgItemTextW 26437->26440 27017 7ff663c41ec4 34 API calls _handle_error 26438->27017 27014 7ff663c42520 26439->27014 26443 7ff663c6b326 26440->26443 26453 7ff663c6b340 GetMessageW 26443->26453 26443->26573 26444 7ff663c6b408 GetDlgItem 26445 7ff663c6b422 SendMessageW SendMessageW 26444->26445 26446 7ff663c6b44f SetFocus 26444->26446 26445->26446 26449 7ff663c6b465 26446->26449 26450 7ff663c6b4f2 26446->26450 26447 7ff663c6b246 26451 7ff663c6b25c 26447->26451 26458 7ff663c4250c SetDlgItemTextW 26447->26458 26456 7ff663c5aae0 48 API calls 26449->26456 27018 7ff663c48d04 33 API calls 2 library calls 26450->27018 26465 7ff663c6c363 26451->26465 26451->26573 26454 7ff663c6b35e IsDialogMessageW 26453->26454 26453->26573 26454->26443 26460 7ff663c6b373 TranslateMessage DispatchMessageW 26454->26460 26462 7ff663c6b46f 26456->26462 26457 7ff663c6b3f5 26463 7ff663c5aae0 48 API calls 26457->26463 26616 7ff663c6b3b1 26457->26616 26458->26451 26460->26443 26461 7ff663c6b52c 27019 7ff663c6ef80 33 API calls 2 library calls 26461->27019 26477 7ff663c4129c 33 API calls 26462->26477 26467 7ff663c6bcd6 SetDlgItemTextW 26463->26467 26472 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26465->26472 26471 7ff663c5aae0 48 API calls 26467->26471 26468 7ff663c41fa0 31 API calls 26468->26573 26470 7ff663c6b537 26476 7ff663c5aae0 48 API calls 26470->26476 26478 7ff663c6bd08 26471->26478 26479 7ff663c6c368 26472->26479 26481 7ff663c6b555 26476->26481 26482 7ff663c6b498 26477->26482 26495 7ff663c4129c 33 API calls 26478->26495 26488 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26479->26488 26485 7ff663c5da98 48 API calls 26481->26485 26774 7ff663c6f0a4 26482->26774 26492 7ff663c6b568 26485->26492 26496 7ff663c6c36e 26488->26496 26499 7ff663c6f0a4 24 API calls 26492->26499 26526 7ff663c6bd31 26495->26526 26506 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26496->26506 26502 7ff663c6b578 26499->26502 26514 7ff663c41fa0 31 API calls 26502->26514 26504 7ff663c6bdda 26509 7ff663c5aae0 48 API calls 26504->26509 26511 7ff663c6c374 26506->26511 26507 7ff663c6b5ec 26519 7ff663c6b61a 26507->26519 27021 7ff663c532a8 26507->27021 26508 7ff663c6b4e8 26508->26507 27020 7ff663c6fa80 33 API calls 2 library calls 26508->27020 26521 7ff663c6bde4 26509->26521 26529 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26511->26529 26524 7ff663c6b586 26514->26524 26788 7ff663c52f58 26519->26788 26542 7ff663c4129c 33 API calls 26521->26542 26524->26496 26524->26508 26526->26504 26531 7ff663c4129c 33 API calls 26526->26531 26536 7ff663c6c37a 26529->26536 26537 7ff663c6bd7f 26531->26537 26547 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26536->26547 26543 7ff663c5aae0 48 API calls 26537->26543 26540 7ff663c6b64c 26800 7ff663c57fc4 26540->26800 26541 7ff663c6b634 GetLastError 26541->26540 26546 7ff663c6be0d 26542->26546 26549 7ff663c6bd8a 26543->26549 26545 7ff663c6b60e 27024 7ff663c69d90 12 API calls _handle_error 26545->27024 26560 7ff663c4129c 33 API calls 26546->26560 26553 7ff663c6c380 26547->26553 26554 7ff663c41150 33 API calls 26549->26554 26561 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26553->26561 26557 7ff663c6bda2 26554->26557 26555 7ff663c6b65e 26558 7ff663c6b674 26555->26558 26559 7ff663c6b665 GetLastError 26555->26559 26566 7ff663c42034 33 API calls 26557->26566 26563 7ff663c6b71c 26558->26563 26567 7ff663c6b72b 26558->26567 26569 7ff663c6b68b GetTickCount 26558->26569 26559->26558 26564 7ff663c6be4e 26560->26564 26565 7ff663c6c386 26561->26565 26563->26567 26586 7ff663c6bb79 26563->26586 26581 7ff663c41fa0 31 API calls 26564->26581 26570 7ff663c4255c 61 API calls 26565->26570 26571 7ff663c6bdbe 26566->26571 26572 7ff663c6ba50 26567->26572 26578 7ff663c56454 34 API calls 26567->26578 26803 7ff663c44228 26569->26803 26575 7ff663c6c3e4 26570->26575 26577 7ff663c41fa0 31 API calls 26571->26577 26572->26616 27033 7ff663c4bd0c 33 API calls 26572->27033 26573->26425 26589 7ff663c6c489 GetDlgItem SetFocus 26575->26589 26611 7ff663c6c3e8 26575->26611 26631 7ff663c6c3fd 26575->26631 26583 7ff663c6bdcc 26577->26583 26584 7ff663c6b74e 26578->26584 26588 7ff663c6be78 26581->26588 26592 7ff663c41fa0 31 API calls 26583->26592 27025 7ff663c5b914 102 API calls 26584->27025 26601 7ff663c5aae0 48 API calls 26586->26601 26587 7ff663c6ba75 27034 7ff663c41150 26587->27034 26597 7ff663c41fa0 31 API calls 26588->26597 26594 7ff663c6c4ba 26589->26594 26591 7ff663c72320 _handle_error 8 API calls 26598 7ff663c6ca97 26591->26598 26592->26504 26606 7ff663c4129c 33 API calls 26594->26606 26595 7ff663c6b6ba 26600 7ff663c41fa0 31 API calls 26595->26600 26603 7ff663c6be83 26597->26603 26599 7ff663c6b768 26605 7ff663c5da98 48 API calls 26599->26605 26607 7ff663c6b6c8 26600->26607 26608 7ff663c6bba7 SetDlgItemTextW 26601->26608 26602 7ff663c6ba8a 26609 7ff663c5aae0 48 API calls 26602->26609 26610 7ff663c41fa0 31 API calls 26603->26610 26604 7ff663c6c434 SendDlgItemMessageW 26604->26611 26612 7ff663c6b7aa GetCommandLineW 26605->26612 26613 7ff663c6c4cc 26606->26613 26813 7ff663c52134 26607->26813 26614 7ff663c42534 26608->26614 26615 7ff663c6ba97 26609->26615 26610->26616 26611->26591 26618 7ff663c6b869 26612->26618 26619 7ff663c6b84f 26612->26619 27039 7ff663c580d8 33 API calls 26613->27039 26621 7ff663c6bbc5 SetDlgItemTextW GetDlgItem 26614->26621 26617 7ff663c41150 33 API calls 26615->26617 26616->26468 26624 7ff663c6baaa 26617->26624 27026 7ff663c6ab54 33 API calls _handle_error 26618->27026 26638 7ff663c420b0 33 API calls 26619->26638 26622 7ff663c6bc13 26621->26622 26623 7ff663c6bbf0 GetWindowLongPtrW SetWindowLongPtrW 26621->26623 26829 7ff663c6ce88 26622->26829 26623->26622 26630 7ff663c41fa0 31 API calls 26624->26630 26626 7ff663c6c4e0 26633 7ff663c4250c SetDlgItemTextW 26626->26633 26637 7ff663c6bab5 26630->26637 26631->26604 26631->26611 26632 7ff663c6b87a 27027 7ff663c6ab54 33 API calls _handle_error 26632->27027 26640 7ff663c6c4f4 26633->26640 26634 7ff663c6b704 26641 7ff663c5204c 100 API calls 26634->26641 26635 7ff663c6b6f5 GetLastError 26635->26634 26643 7ff663c41fa0 31 API calls 26637->26643 26638->26618 26649 7ff663c6c526 SendDlgItemMessageW FindFirstFileW 26640->26649 26645 7ff663c6b711 26641->26645 26642 7ff663c6ce88 160 API calls 26646 7ff663c6bc3c 26642->26646 26647 7ff663c6bac3 26643->26647 26644 7ff663c6b88b 27028 7ff663c6ab54 33 API calls _handle_error 26644->27028 26650 7ff663c41fa0 31 API calls 26645->26650 26980 7ff663c6f974 26646->26980 26658 7ff663c5aae0 48 API calls 26647->26658 26653 7ff663c6c57b 26649->26653 26746 7ff663c6ca04 26649->26746 26650->26563 26652 7ff663c6b89c 27029 7ff663c5b9b4 102 API calls 26652->27029 26663 7ff663c5aae0 48 API calls 26653->26663 26656 7ff663c6ca81 26656->26611 26657 7ff663c6ce88 160 API calls 26673 7ff663c6bc6a 26657->26673 26661 7ff663c6badb 26658->26661 26659 7ff663c6b8b3 27030 7ff663c6fbdc 33 API calls 26659->27030 26660 7ff663c6caa9 26665 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26660->26665 26674 7ff663c4129c 33 API calls 26661->26674 26664 7ff663c6c59e 26663->26664 26675 7ff663c4129c 33 API calls 26664->26675 26670 7ff663c6caae 26665->26670 26666 7ff663c6bc96 27038 7ff663c42298 GetDlgItem EnableWindow 26666->27038 26667 7ff663c6b8d2 CreateFileMappingW 26668 7ff663c6b953 ShellExecuteExW 26667->26668 26669 7ff663c6b911 MapViewOfFile 26667->26669 26681 7ff663c6b974 26668->26681 27031 7ff663c73640 26669->27031 26676 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26670->26676 26673->26666 26677 7ff663c6ce88 160 API calls 26673->26677 26686 7ff663c6bb04 26674->26686 26678 7ff663c6c5cd 26675->26678 26679 7ff663c6cab4 26676->26679 26677->26666 26680 7ff663c41150 33 API calls 26678->26680 26685 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26679->26685 26682 7ff663c6c5e8 26680->26682 26683 7ff663c6b996 WaitForInputIdle 26681->26683 26684 7ff663c6b9c3 26681->26684 26688 7ff663c4e164 33 API calls 26682->26688 26689 7ff663c6b9ab 26683->26689 26694 7ff663c6b9dc UnmapViewOfFile CloseHandle 26684->26694 26695 7ff663c6b9ef 26684->26695 26690 7ff663c6caba 26685->26690 26686->26536 26687 7ff663c6bb5a 26686->26687 26691 7ff663c41fa0 31 API calls 26687->26691 26692 7ff663c6c5ff 26688->26692 26689->26684 26693 7ff663c6b9b1 Sleep 26689->26693 26698 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26690->26698 26691->26616 26696 7ff663c41fa0 31 API calls 26692->26696 26693->26684 26693->26689 26694->26695 26695->26511 26697 7ff663c6ba25 26695->26697 26699 7ff663c6c60c 26696->26699 26701 7ff663c41fa0 31 API calls 26697->26701 26700 7ff663c6cac0 26698->26700 26699->26670 26703 7ff663c41fa0 31 API calls 26699->26703 26704 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26700->26704 26702 7ff663c6ba42 26701->26702 26705 7ff663c41fa0 31 API calls 26702->26705 26706 7ff663c6c673 26703->26706 26707 7ff663c6cac6 26704->26707 26705->26572 26708 7ff663c4250c SetDlgItemTextW 26706->26708 26710 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26707->26710 26709 7ff663c6c687 FindClose 26708->26709 26711 7ff663c6c797 SendDlgItemMessageW 26709->26711 26712 7ff663c6c6a3 26709->26712 26713 7ff663c6cacc 26710->26713 26714 7ff663c6c7cb 26711->26714 27040 7ff663c6a2cc 10 API calls _handle_error 26712->27040 26717 7ff663c5aae0 48 API calls 26714->26717 26716 7ff663c6c6c6 26718 7ff663c5aae0 48 API calls 26716->26718 26719 7ff663c6c7d8 26717->26719 26720 7ff663c6c6cf 26718->26720 26722 7ff663c4129c 33 API calls 26719->26722 26721 7ff663c5da98 48 API calls 26720->26721 26725 7ff663c6c6ec BuildCatchObjectHelperInternal 26721->26725 26724 7ff663c6c807 26722->26724 26723 7ff663c41fa0 31 API calls 26726 7ff663c6c783 26723->26726 26727 7ff663c41150 33 API calls 26724->26727 26725->26679 26725->26723 26728 7ff663c4250c SetDlgItemTextW 26726->26728 26729 7ff663c6c822 26727->26729 26728->26711 26730 7ff663c4e164 33 API calls 26729->26730 26731 7ff663c6c839 26730->26731 26732 7ff663c41fa0 31 API calls 26731->26732 26733 7ff663c6c845 BuildCatchObjectHelperInternal 26732->26733 26734 7ff663c41fa0 31 API calls 26733->26734 26735 7ff663c6c87f 26734->26735 26736 7ff663c41fa0 31 API calls 26735->26736 26737 7ff663c6c88c 26736->26737 26737->26690 26738 7ff663c41fa0 31 API calls 26737->26738 26739 7ff663c6c8f3 26738->26739 26740 7ff663c4250c SetDlgItemTextW 26739->26740 26741 7ff663c6c907 26740->26741 26741->26746 27041 7ff663c6a2cc 10 API calls _handle_error 26741->27041 26743 7ff663c6c932 26744 7ff663c5aae0 48 API calls 26743->26744 26745 7ff663c6c93c 26744->26745 26747 7ff663c5da98 48 API calls 26745->26747 26746->26611 26746->26656 26746->26660 26746->26707 26749 7ff663c6c959 BuildCatchObjectHelperInternal 26747->26749 26748 7ff663c41fa0 31 API calls 26750 7ff663c6c9f0 26748->26750 26749->26700 26749->26748 26751 7ff663c4250c SetDlgItemTextW 26750->26751 26751->26746 26753 7ff663c4256a 26752->26753 26754 7ff663c425d0 26752->26754 26753->26754 27042 7ff663c5a4ac 26753->27042 26754->26418 26756 7ff663c4258f 26756->26754 26757 7ff663c425a4 GetDlgItem 26756->26757 26757->26754 26758 7ff663c425b7 26757->26758 26758->26754 26759 7ff663c425be SetWindowTextW 26758->26759 26759->26754 26761 7ff663c422fc 26760->26761 26762 7ff663c42334 26760->26762 26764 7ff663c4129c 33 API calls 26761->26764 27091 7ff663c423f8 GetWindowTextLengthW 26762->27091 26765 7ff663c4232a BuildCatchObjectHelperInternal 26764->26765 26766 7ff663c41fa0 31 API calls 26765->26766 26769 7ff663c42389 26765->26769 26766->26769 26767 7ff663c423c8 26768 7ff663c72320 _handle_error 8 API calls 26767->26768 26770 7ff663c423dd 26768->26770 26769->26767 26771 7ff663c423f0 26769->26771 26770->26444 26770->26457 26770->26616 26772 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26771->26772 26773 7ff663c423f5 26772->26773 27103 7ff663c6ae1c PeekMessageW 26774->27103 26777 7ff663c6f0f5 26783 7ff663c6f101 ShowWindow SendMessageW SendMessageW 26777->26783 26778 7ff663c6f143 SendMessageW SendMessageW 26779 7ff663c6f189 26778->26779 26780 7ff663c6f1a4 SendMessageW 26778->26780 26779->26780 26781 7ff663c6f1c6 SendMessageW SendMessageW 26780->26781 26782 7ff663c6f1c3 26780->26782 26784 7ff663c6f218 SendMessageW 26781->26784 26785 7ff663c6f1f3 SendMessageW 26781->26785 26782->26781 26783->26778 26786 7ff663c72320 _handle_error 8 API calls 26784->26786 26785->26784 26787 7ff663c6b4a5 26786->26787 26787->26479 26787->26508 26789 7ff663c5309d 26788->26789 26796 7ff663c52f8e 26788->26796 26790 7ff663c72320 _handle_error 8 API calls 26789->26790 26791 7ff663c530b3 26790->26791 26791->26540 26791->26541 26792 7ff663c53077 26792->26789 26793 7ff663c53684 56 API calls 26792->26793 26793->26789 26794 7ff663c4129c 33 API calls 26794->26796 26796->26792 26796->26794 26797 7ff663c530c8 26796->26797 27108 7ff663c53684 26796->27108 26798 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26797->26798 26799 7ff663c530cd 26798->26799 26801 7ff663c57fd2 SetCurrentDirectoryW 26800->26801 26802 7ff663c57fcf 26800->26802 26801->26555 26802->26801 26804 7ff663c44255 26803->26804 26805 7ff663c4426a 26804->26805 26806 7ff663c4129c 33 API calls 26804->26806 26807 7ff663c72320 _handle_error 8 API calls 26805->26807 26806->26805 26808 7ff663c442a1 26807->26808 26809 7ff663c43c84 26808->26809 26810 7ff663c43cab 26809->26810 27142 7ff663c4710c 26810->27142 26812 7ff663c43cbb BuildCatchObjectHelperInternal 26812->26595 26815 7ff663c5216a 26813->26815 26814 7ff663c5219e 26817 7ff663c56a0c 49 API calls 26814->26817 26818 7ff663c5227f 26814->26818 26815->26814 26816 7ff663c521b1 CreateFileW 26815->26816 26816->26814 26821 7ff663c52209 26817->26821 26819 7ff663c522af 26818->26819 26825 7ff663c420b0 33 API calls 26818->26825 26820 7ff663c72320 _handle_error 8 API calls 26819->26820 26822 7ff663c522c4 26820->26822 26823 7ff663c5220d CreateFileW 26821->26823 26824 7ff663c52246 26821->26824 26822->26634 26822->26635 26823->26824 26824->26818 26826 7ff663c522d8 26824->26826 26825->26819 26827 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26826->26827 26828 7ff663c522dd 26827->26828 27154 7ff663c6aa08 26829->27154 26831 7ff663c6d1ee 26832 7ff663c41fa0 31 API calls 26831->26832 26833 7ff663c6d1f7 26832->26833 26835 7ff663c72320 _handle_error 8 API calls 26833->26835 26834 7ff663c5d22c 33 API calls 26975 7ff663c6cf03 BuildCatchObjectHelperInternal 26834->26975 26836 7ff663c6bc2b 26835->26836 26836->26642 26837 7ff663c6eefa 27243 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 26837->27243 26840 7ff663c6ef00 27244 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 26840->27244 26843 7ff663c6ef06 26846 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26843->26846 26844 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26845 7ff663c6eef4 26844->26845 27242 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 26845->27242 26848 7ff663c6ef0c 26846->26848 26850 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26848->26850 26851 7ff663c6ef12 26850->26851 26853 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26851->26853 26852 7ff663c6eee8 27241 7ff663c42004 33 API calls std::_Xinvalid_argument 26852->27241 26857 7ff663c6ef18 26853->26857 26854 7ff663c420b0 33 API calls 26860 7ff663c6ee77 26854->26860 26855 7ff663c413a4 33 API calls 26861 7ff663c6dc3a GetTempPathW 26855->26861 26856 7ff663c562dc 35 API calls 26856->26975 26867 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26857->26867 26858 7ff663c6eed2 27240 7ff663c41f80 33 API calls 3 library calls 26858->27240 27239 7ff663c6abe8 33 API calls 3 library calls 26860->27239 26861->26975 26863 7ff663c6eeee 26863->26844 26865 7ff663c42520 SetWindowTextW 26865->26975 26871 7ff663c6ef1e 26867->26871 26868 7ff663c7bb8c 43 API calls 26868->26975 26870 7ff663c6ee8d 26874 7ff663c41fa0 31 API calls 26870->26874 26877 7ff663c6eea4 BuildCatchObjectHelperInternal 26870->26877 26878 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26871->26878 26872 7ff663c48d04 33 API calls 26872->26975 26874->26877 26875 7ff663c41fa0 31 API calls 26875->26858 26876 7ff663c6e7f3 26876->26852 26876->26858 26879 7ff663c721d0 33 API calls 26876->26879 26886 7ff663c6e83b BuildCatchObjectHelperInternal 26876->26886 26877->26875 26881 7ff663c6ef24 26878->26881 26879->26886 26885 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26881->26885 26882 7ff663c6aa08 33 API calls 26882->26975 26883 7ff663c6ef6c 27247 7ff663c42004 33 API calls std::_Xinvalid_argument 26883->27247 26884 7ff663c44228 33 API calls 26884->26975 26890 7ff663c6ef2a 26885->26890 26897 7ff663c420b0 33 API calls 26886->26897 26938 7ff663c6eb8f 26886->26938 26888 7ff663c41fa0 31 API calls 26894 7ff663c6ee4a 26888->26894 26889 7ff663c6ef78 27249 7ff663c42004 33 API calls std::_Xinvalid_argument 26889->27249 26903 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26890->26903 26891 7ff663c6ef72 27248 7ff663c41f80 33 API calls 3 library calls 26891->27248 26892 7ff663c420b0 33 API calls 26972 7ff663c6d489 26892->26972 26894->26854 26894->26858 26895 7ff663c55820 33 API calls 26895->26975 26896 7ff663c6ef66 27246 7ff663c41f80 33 API calls 3 library calls 26896->27246 26904 7ff663c6e963 26897->26904 26900 7ff663c6ed40 26900->26889 26900->26891 26917 7ff663c6ed3b BuildCatchObjectHelperInternal 26900->26917 26922 7ff663c721d0 33 API calls 26900->26922 26902 7ff663c6ec2a 26902->26883 26902->26896 26912 7ff663c6ec72 BuildCatchObjectHelperInternal 26902->26912 26902->26917 26919 7ff663c721d0 33 API calls 26902->26919 26910 7ff663c6ef30 26903->26910 26911 7ff663c6ef60 26904->26911 26918 7ff663c4129c 33 API calls 26904->26918 26907 7ff663c41fa0 31 API calls 26907->26975 26908 7ff663c699c8 31 API calls 26908->26975 26909 7ff663c53d34 51 API calls 26909->26975 26923 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26910->26923 27245 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 26911->27245 27159 7ff663c6f4e0 26912->27159 26914 7ff663c6d5e9 GetDlgItem 26920 7ff663c42520 SetWindowTextW 26914->26920 26917->26888 26924 7ff663c6e9a6 26918->26924 26919->26912 26925 7ff663c6d608 SendMessageW 26920->26925 26922->26917 26929 7ff663c6ef36 26923->26929 27235 7ff663c5d22c 26924->27235 26925->26972 26926 7ff663c532bc 51 API calls 26926->26975 26927 7ff663c42674 31 API calls 26927->26975 26933 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26929->26933 26931 7ff663c55b60 53 API calls 26931->26975 26932 7ff663c5dc2c 33 API calls 26932->26975 26937 7ff663c6ef3c 26933->26937 26934 7ff663c6d63c SendMessageW 26934->26972 26936 7ff663c53f30 54 API calls 26936->26975 26942 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26937->26942 26938->26900 26938->26902 26943 7ff663c6ef54 26938->26943 26946 7ff663c6ef5a 26938->26946 26945 7ff663c6ef42 26942->26945 26944 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26943->26944 26944->26946 26949 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26945->26949 26947 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26946->26947 26947->26911 26948 7ff663c41744 33 API calls 26948->26975 26951 7ff663c6ef48 26949->26951 26950 7ff663c532a8 51 API calls 26950->26975 26954 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26951->26954 26952 7ff663c55aa8 33 API calls 26952->26975 26953 7ff663c4e164 33 API calls 26953->26975 26956 7ff663c6ef4e 26954->26956 26955 7ff663c4250c SetDlgItemTextW 26955->26975 26960 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 26956->26960 26958 7ff663c57df4 47 API calls 26958->26975 26959 7ff663c41150 33 API calls 26959->26975 26960->26943 26962 7ff663c41fa0 31 API calls 26968 7ff663c6e9d1 26962->26968 26963 7ff663c4129c 33 API calls 26963->26968 26966 7ff663c613c4 CompareStringW 26966->26968 26968->26938 26968->26951 26968->26956 26968->26962 26968->26963 26968->26966 26969 7ff663c5d22c 33 API calls 26968->26969 26969->26968 26970 7ff663c6db21 MoveFileW 26971 7ff663c6db55 MoveFileExW 26970->26971 26970->26972 26971->26972 26972->26843 26972->26892 26972->26934 26974 7ff663c41fa0 31 API calls 26972->26974 26972->26975 27201 7ff663c4df4c 47 API calls BuildCatchObjectHelperInternal 26972->27201 27204 7ff663c42674 31 API calls _invalid_parameter_noinfo_noreturn 26972->27204 27205 7ff663c6a440 115 API calls 2 library calls 26972->27205 26973 7ff663c4129c 33 API calls 26973->26975 26974->26972 26975->26831 26975->26834 26975->26837 26975->26840 26975->26845 26975->26848 26975->26851 26975->26855 26975->26856 26975->26857 26975->26863 26975->26865 26975->26868 26975->26871 26975->26872 26975->26876 26975->26881 26975->26882 26975->26884 26975->26890 26975->26894 26975->26895 26975->26907 26975->26908 26975->26909 26975->26910 26975->26926 26975->26927 26975->26929 26975->26931 26975->26932 26975->26936 26975->26937 26975->26945 26975->26948 26975->26950 26975->26952 26975->26953 26975->26955 26975->26958 26975->26959 26975->26970 26975->26972 26975->26973 26976 7ff663c52f58 56 API calls 26975->26976 26977 7ff663c420b0 33 API calls 26975->26977 26978 7ff663c42034 33 API calls 26975->26978 27158 7ff663c613c4 CompareStringW 26975->27158 27198 7ff663c5cfa4 35 API calls _invalid_parameter_noinfo_noreturn 26975->27198 27199 7ff663c695b4 33 API calls Concurrency::cancel_current_task 26975->27199 27200 7ff663c70684 31 API calls _invalid_parameter_noinfo_noreturn 26975->27200 27202 7ff663c6a834 33 API calls _invalid_parameter_noinfo_noreturn 26975->27202 27203 7ff663c69518 33 API calls 26975->27203 27206 7ff663c6abe8 33 API calls 3 library calls 26975->27206 27207 7ff663c57368 33 API calls 2 library calls 26975->27207 27208 7ff663c54088 33 API calls 26975->27208 27209 7ff663c565b0 33 API calls 3 library calls 26975->27209 27210 7ff663c572cc 26975->27210 27214 7ff663c531bc 26975->27214 27228 7ff663c53ea0 FindClose 26975->27228 27229 7ff663c613f4 CompareStringW 26975->27229 27230 7ff663c69cd0 47 API calls 26975->27230 27231 7ff663c687d8 51 API calls 3 library calls 26975->27231 27232 7ff663c6ab54 33 API calls _handle_error 26975->27232 27233 7ff663c55b08 CompareStringW 26975->27233 27234 7ff663c57eb0 47 API calls 26975->27234 26976->26975 26977->26975 26978->26975 26981 7ff663c6f9a3 26980->26981 26982 7ff663c420b0 33 API calls 26981->26982 26983 7ff663c6f9b9 26982->26983 26984 7ff663c6f9ee 26983->26984 26985 7ff663c420b0 33 API calls 26983->26985 27257 7ff663c4e34c 26984->27257 26985->26984 26987 7ff663c6fa4b 27277 7ff663c4e7a8 26987->27277 26991 7ff663c6fa61 26992 7ff663c72320 _handle_error 8 API calls 26991->26992 26993 7ff663c6bc52 26992->26993 26993->26657 26995 7ff663c6849c 4 API calls 26994->26995 26996 7ff663c6f3bf 26995->26996 26997 7ff663c6f4b7 26996->26997 26998 7ff663c6f3c7 GetWindow 26996->26998 26999 7ff663c72320 _handle_error 8 API calls 26997->26999 27005 7ff663c6f3e2 26998->27005 27000 7ff663c6be9b 26999->27000 27000->26426 27000->26427 27001 7ff663c6f3ee GetClassNameW 28327 7ff663c613c4 CompareStringW 27001->28327 27003 7ff663c6f496 GetWindow 27003->26997 27003->27005 27004 7ff663c6f417 GetWindowLongPtrW 27004->27003 27006 7ff663c6f429 SendMessageW 27004->27006 27005->26997 27005->27001 27005->27003 27005->27004 27006->27003 27007 7ff663c6f445 GetObjectW 27006->27007 28328 7ff663c68504 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 27007->28328 27009 7ff663c6f461 27010 7ff663c684cc 4 API calls 27009->27010 28329 7ff663c68df4 15 API calls _handle_error 27009->28329 27010->27009 27012 7ff663c6f479 SendMessageW 28330 7ff663cae0f0 27012->28330 27015 7ff663c42527 27014->27015 27016 7ff663c4252a SetWindowTextW 27014->27016 27015->27016 27017->26447 27018->26461 27019->26470 27020->26507 27022 7ff663c532bc 51 API calls 27021->27022 27023 7ff663c532b1 27022->27023 27023->26519 27023->26545 27024->26519 27025->26599 27026->26632 27027->26644 27028->26652 27029->26659 27030->26667 27032 7ff663c73620 27031->27032 27032->26668 27033->26587 27035 7ff663c41177 27034->27035 27036 7ff663c42034 33 API calls 27035->27036 27037 7ff663c41185 BuildCatchObjectHelperInternal 27036->27037 27037->26602 27039->26626 27040->26716 27041->26743 27043 7ff663c53e28 swprintf 46 API calls 27042->27043 27044 7ff663c5a509 27043->27044 27045 7ff663c60f68 WideCharToMultiByte 27044->27045 27047 7ff663c5a519 27045->27047 27046 7ff663c5a589 27067 7ff663c59408 27046->27067 27047->27046 27058 7ff663c59800 31 API calls 27047->27058 27064 7ff663c5a56a SetDlgItemTextW 27047->27064 27050 7ff663c5a603 27053 7ff663c5a60c GetWindowLongPtrW 27050->27053 27054 7ff663c5a6c2 27050->27054 27051 7ff663c5a6f2 GetSystemMetrics GetWindow 27052 7ff663c5a821 27051->27052 27065 7ff663c5a71d 27051->27065 27055 7ff663c72320 _handle_error 8 API calls 27052->27055 27056 7ff663cae2c0 27053->27056 27082 7ff663c595a8 27054->27082 27059 7ff663c5a830 27055->27059 27060 7ff663c5a6aa GetWindowRect 27056->27060 27058->27047 27059->26756 27060->27054 27062 7ff663c5a73e GetWindowRect 27062->27065 27063 7ff663c5a6e5 SetWindowTextW 27063->27051 27064->27047 27065->27052 27065->27062 27066 7ff663c5a800 GetWindow 27065->27066 27066->27052 27066->27065 27068 7ff663c595a8 47 API calls 27067->27068 27071 7ff663c5944f 27068->27071 27069 7ff663c72320 _handle_error 8 API calls 27070 7ff663c5958e GetWindowRect GetClientRect 27069->27070 27070->27050 27070->27051 27072 7ff663c4129c 33 API calls 27071->27072 27080 7ff663c5955a 27071->27080 27073 7ff663c5949c 27072->27073 27074 7ff663c595a1 27073->27074 27076 7ff663c4129c 33 API calls 27073->27076 27075 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27074->27075 27077 7ff663c595a7 27075->27077 27078 7ff663c59514 27076->27078 27079 7ff663c5959c 27078->27079 27078->27080 27081 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27079->27081 27080->27069 27081->27074 27083 7ff663c53e28 swprintf 46 API calls 27082->27083 27084 7ff663c595eb 27083->27084 27085 7ff663c60f68 WideCharToMultiByte 27084->27085 27086 7ff663c59603 27085->27086 27087 7ff663c59800 31 API calls 27086->27087 27088 7ff663c5961b 27087->27088 27089 7ff663c72320 _handle_error 8 API calls 27088->27089 27090 7ff663c5962b 27089->27090 27090->27051 27090->27063 27092 7ff663c413a4 33 API calls 27091->27092 27093 7ff663c42462 GetWindowTextW 27092->27093 27094 7ff663c42494 27093->27094 27095 7ff663c4129c 33 API calls 27094->27095 27096 7ff663c424a2 27095->27096 27099 7ff663c42505 27096->27099 27100 7ff663c424dd 27096->27100 27097 7ff663c72320 _handle_error 8 API calls 27098 7ff663c424f3 27097->27098 27098->26765 27101 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27099->27101 27100->27097 27102 7ff663c4250a 27101->27102 27104 7ff663c6ae3c GetMessageW 27103->27104 27105 7ff663c6ae80 GetDlgItem 27103->27105 27106 7ff663c6ae6a TranslateMessage DispatchMessageW 27104->27106 27107 7ff663c6ae5b IsDialogMessageW 27104->27107 27105->26777 27105->26778 27106->27105 27107->27105 27107->27106 27110 7ff663c536b3 27108->27110 27109 7ff663c536e0 27112 7ff663c532bc 51 API calls 27109->27112 27110->27109 27111 7ff663c536cc CreateDirectoryW 27110->27111 27111->27109 27113 7ff663c5377d 27111->27113 27114 7ff663c536ee 27112->27114 27115 7ff663c5378d 27113->27115 27128 7ff663c53d34 27113->27128 27116 7ff663c53791 GetLastError 27114->27116 27118 7ff663c56a0c 49 API calls 27114->27118 27119 7ff663c72320 _handle_error 8 API calls 27115->27119 27116->27115 27120 7ff663c5371c 27118->27120 27121 7ff663c537b9 27119->27121 27122 7ff663c5373b 27120->27122 27123 7ff663c53720 CreateDirectoryW 27120->27123 27121->26796 27124 7ff663c53774 27122->27124 27125 7ff663c537ce 27122->27125 27123->27122 27124->27113 27124->27116 27126 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27125->27126 27127 7ff663c537d3 27126->27127 27129 7ff663c53d5b 27128->27129 27130 7ff663c53d5e SetFileAttributesW 27128->27130 27129->27130 27131 7ff663c53df5 27130->27131 27132 7ff663c53d74 27130->27132 27133 7ff663c72320 _handle_error 8 API calls 27131->27133 27134 7ff663c56a0c 49 API calls 27132->27134 27135 7ff663c53e0a 27133->27135 27136 7ff663c53d99 27134->27136 27135->27115 27137 7ff663c53dbc 27136->27137 27138 7ff663c53d9d SetFileAttributesW 27136->27138 27137->27131 27139 7ff663c53e1a 27137->27139 27138->27137 27140 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27139->27140 27141 7ff663c53e1f 27140->27141 27143 7ff663c47206 27142->27143 27144 7ff663c4713b 27142->27144 27152 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 27143->27152 27150 7ff663c4714b BuildCatchObjectHelperInternal 27144->27150 27151 7ff663c43f48 33 API calls 2 library calls 27144->27151 27147 7ff663c4720b 27148 7ff663c47273 27147->27148 27153 7ff663c4889c 8 API calls BuildCatchObjectHelperInternal 27147->27153 27148->26812 27150->26812 27151->27150 27152->27147 27153->27147 27155 7ff663c6aa2f 27154->27155 27156 7ff663c6aa36 27154->27156 27155->26975 27156->27155 27157 7ff663c41744 33 API calls 27156->27157 27157->27156 27158->26975 27160 7ff663c6f87d 27159->27160 27165 7ff663c6f529 memcpy_s 27159->27165 27161 7ff663c41fa0 31 API calls 27160->27161 27162 7ff663c6f89c 27161->27162 27163 7ff663c72320 _handle_error 8 API calls 27162->27163 27164 7ff663c6f8a8 27163->27164 27164->26917 27166 7ff663c6f684 27165->27166 27250 7ff663c613c4 CompareStringW 27165->27250 27168 7ff663c4129c 33 API calls 27166->27168 27169 7ff663c6f6c0 27168->27169 27170 7ff663c532a8 51 API calls 27169->27170 27171 7ff663c6f6ca 27170->27171 27172 7ff663c41fa0 31 API calls 27171->27172 27174 7ff663c6f6d5 27172->27174 27173 7ff663c6f742 ShellExecuteExW 27175 7ff663c6f755 27173->27175 27176 7ff663c6f846 27173->27176 27174->27173 27177 7ff663c4129c 33 API calls 27174->27177 27178 7ff663c6f774 IsWindowVisible 27175->27178 27179 7ff663c6f78e WaitForInputIdle 27175->27179 27183 7ff663c6f7e3 CloseHandle 27175->27183 27176->27160 27181 7ff663c6f8fb 27176->27181 27182 7ff663c6f717 27177->27182 27178->27179 27184 7ff663c6f781 ShowWindow 27178->27184 27180 7ff663c6fe24 5 API calls 27179->27180 27185 7ff663c6f7a6 27180->27185 27186 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27181->27186 27251 7ff663c55b60 53 API calls 2 library calls 27182->27251 27188 7ff663c6f801 27183->27188 27189 7ff663c6f7f2 27183->27189 27184->27179 27185->27183 27193 7ff663c6f7b4 GetExitCodeProcess 27185->27193 27190 7ff663c6f900 27186->27190 27188->27176 27197 7ff663c6f837 ShowWindow 27188->27197 27252 7ff663c613c4 CompareStringW 27189->27252 27191 7ff663c6f725 27194 7ff663c41fa0 31 API calls 27191->27194 27193->27183 27195 7ff663c6f7c7 27193->27195 27196 7ff663c6f72f 27194->27196 27195->27183 27196->27173 27197->27176 27198->26975 27199->26975 27200->26975 27201->26972 27202->26975 27203->26975 27205->26914 27206->26975 27207->26975 27208->26975 27209->26975 27211 7ff663c572ea 27210->27211 27253 7ff663c4b3a8 27211->27253 27215 7ff663c531e7 DeleteFileW 27214->27215 27216 7ff663c531e4 27214->27216 27217 7ff663c531fd 27215->27217 27224 7ff663c5327c 27215->27224 27216->27215 27218 7ff663c56a0c 49 API calls 27217->27218 27220 7ff663c53222 27218->27220 27219 7ff663c72320 _handle_error 8 API calls 27221 7ff663c53291 27219->27221 27222 7ff663c53226 DeleteFileW 27220->27222 27223 7ff663c53243 27220->27223 27221->26975 27222->27223 27223->27224 27225 7ff663c532a1 27223->27225 27224->27219 27226 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27225->27226 27227 7ff663c532a6 27226->27227 27229->26975 27230->26975 27231->26975 27232->26975 27233->26975 27234->26975 27238 7ff663c5d25e 27235->27238 27236 7ff663c5d292 27236->26968 27237 7ff663c41744 33 API calls 27237->27238 27238->27236 27238->27237 27239->26870 27240->26852 27242->26837 27243->26840 27244->26843 27245->26896 27246->26883 27248->26889 27250->27166 27251->27191 27252->27188 27256 7ff663c4b3f2 memcpy_s 27253->27256 27254 7ff663c72320 _handle_error 8 API calls 27255 7ff663c4b4b6 27254->27255 27255->26975 27256->27254 27313 7ff663c586ec 27257->27313 27259 7ff663c4e3c4 27319 7ff663c4e600 27259->27319 27261 7ff663c4e4d4 27264 7ff663c721d0 33 API calls 27261->27264 27262 7ff663c4e549 27265 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27262->27265 27263 7ff663c4e454 27263->27261 27263->27262 27266 7ff663c4e4f0 27264->27266 27273 7ff663c4e54e 27265->27273 27325 7ff663c63148 102 API calls 27266->27325 27268 7ff663c4e51d 27269 7ff663c72320 _handle_error 8 API calls 27268->27269 27270 7ff663c4e52d 27269->27270 27270->26987 27271 7ff663c518c2 27272 7ff663c5190d 27271->27272 27274 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27271->27274 27272->26987 27273->27271 27273->27272 27275 7ff663c41fa0 31 API calls 27273->27275 27276 7ff663c5193b 27274->27276 27275->27273 27278 7ff663c4e7ea 27277->27278 27279 7ff663c4e864 27278->27279 27281 7ff663c4e8a1 27278->27281 27326 7ff663c53ec8 27278->27326 27279->27281 27282 7ff663c4e993 27279->27282 27289 7ff663c4e900 27281->27289 27333 7ff663c4f578 27281->27333 27284 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27282->27284 27283 7ff663c4e955 27287 7ff663c72320 _handle_error 8 API calls 27283->27287 27285 7ff663c4e998 27284->27285 27288 7ff663c4e97e 27287->27288 27291 7ff663c4e578 27288->27291 27289->27283 27369 7ff663c428a4 82 API calls 2 library calls 27289->27369 28313 7ff663c515d8 27291->28313 27294 7ff663c4e59e 27296 7ff663c41fa0 31 API calls 27294->27296 27295 7ff663c61870 108 API calls 27295->27294 27297 7ff663c4e5b7 27296->27297 27298 7ff663c41fa0 31 API calls 27297->27298 27299 7ff663c4e5c3 27298->27299 27300 7ff663c41fa0 31 API calls 27299->27300 27301 7ff663c4e5cf 27300->27301 27302 7ff663c5878c 108 API calls 27301->27302 27303 7ff663c4e5db 27302->27303 27304 7ff663c41fa0 31 API calls 27303->27304 27305 7ff663c4e5e4 27304->27305 27306 7ff663c41fa0 31 API calls 27305->27306 27310 7ff663c4e5ed 27306->27310 27307 7ff663c518c2 27309 7ff663c5190d 27307->27309 27311 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27307->27311 27308 7ff663c41fa0 31 API calls 27308->27310 27309->26991 27310->27307 27310->27308 27310->27309 27312 7ff663c5193b 27311->27312 27314 7ff663c5870a 27313->27314 27315 7ff663c721d0 33 API calls 27314->27315 27317 7ff663c5872f 27315->27317 27316 7ff663c721d0 33 API calls 27318 7ff663c58759 27316->27318 27317->27316 27318->27259 27320 7ff663c4e627 27319->27320 27322 7ff663c4e62c BuildCatchObjectHelperInternal 27319->27322 27321 7ff663c41fa0 31 API calls 27320->27321 27321->27322 27323 7ff663c41fa0 31 API calls 27322->27323 27324 7ff663c4e668 BuildCatchObjectHelperInternal 27322->27324 27323->27324 27324->27263 27325->27268 27327 7ff663c572cc 8 API calls 27326->27327 27328 7ff663c53ee1 27327->27328 27329 7ff663c53f0f 27328->27329 27370 7ff663c540bc 27328->27370 27329->27278 27332 7ff663c53efa FindClose 27332->27329 27334 7ff663c4f598 _snwprintf 27333->27334 27396 7ff663c42950 27334->27396 27337 7ff663c4f5cc 27341 7ff663c4f5fc 27337->27341 27411 7ff663c433e4 27337->27411 27340 7ff663c4f5f8 27340->27341 27443 7ff663c43ad8 27340->27443 27662 7ff663c42c54 27341->27662 27348 7ff663c4f7cb 27453 7ff663c4f8a4 27348->27453 27351 7ff663c4f662 27683 7ff663c57918 48 API calls 2 library calls 27351->27683 27353 7ff663c4f677 27354 7ff663c53ec8 55 API calls 27353->27354 27360 7ff663c4f6ad 27354->27360 27356 7ff663c4f842 27356->27341 27474 7ff663c469f8 27356->27474 27485 7ff663c4f930 27356->27485 27362 7ff663c4f89a 27360->27362 27363 7ff663c4f74d 27360->27363 27364 7ff663c53ec8 55 API calls 27360->27364 27684 7ff663c57918 48 API calls 2 library calls 27360->27684 27365 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27362->27365 27363->27348 27363->27362 27366 7ff663c4f895 27363->27366 27364->27360 27368 7ff663c4f8a0 27365->27368 27367 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27366->27367 27367->27362 27369->27283 27371 7ff663c540f9 FindFirstFileW 27370->27371 27372 7ff663c541d2 FindNextFileW 27370->27372 27374 7ff663c541f3 27371->27374 27376 7ff663c5411e 27371->27376 27372->27374 27375 7ff663c541e1 GetLastError 27372->27375 27379 7ff663c420b0 33 API calls 27374->27379 27380 7ff663c54211 27374->27380 27390 7ff663c541c0 27375->27390 27377 7ff663c56a0c 49 API calls 27376->27377 27378 7ff663c54144 27377->27378 27382 7ff663c54167 27378->27382 27383 7ff663c54148 FindFirstFileW 27378->27383 27379->27380 27384 7ff663c4129c 33 API calls 27380->27384 27381 7ff663c72320 _handle_error 8 API calls 27385 7ff663c53ef4 27381->27385 27382->27374 27387 7ff663c541af GetLastError 27382->27387 27389 7ff663c54314 27382->27389 27383->27382 27386 7ff663c5423b 27384->27386 27385->27329 27385->27332 27388 7ff663c58090 47 API calls 27386->27388 27387->27390 27391 7ff663c54249 27388->27391 27392 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27389->27392 27390->27381 27391->27390 27394 7ff663c5430f 27391->27394 27393 7ff663c5431a 27392->27393 27395 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27394->27395 27395->27389 27397 7ff663c4296c 27396->27397 27398 7ff663c586ec 33 API calls 27397->27398 27399 7ff663c4298d 27398->27399 27400 7ff663c721d0 33 API calls 27399->27400 27403 7ff663c42ac2 27399->27403 27401 7ff663c42ab0 27400->27401 27401->27403 27405 7ff663c491c8 35 API calls 27401->27405 27685 7ff663c54d04 27403->27685 27405->27403 27406 7ff663c52ca8 27410 7ff663c524c0 54 API calls 27406->27410 27407 7ff663c52cc1 27408 7ff663c52cc5 27407->27408 27699 7ff663c4b7e8 99 API calls 2 library calls 27407->27699 27408->27337 27410->27407 27434 7ff663c528d0 104 API calls 27411->27434 27412 7ff663c4344e 27413 7ff663c43674 27412->27413 27421 7ff663c43682 27412->27421 27700 7ff663c428a4 82 API calls 2 library calls 27413->27700 27414 7ff663c43431 memcpy_s 27414->27412 27416 7ff663c43601 27414->27416 27441 7ff663c52bb0 101 API calls 27414->27441 27416->27340 27417 7ff663c469f8 141 API calls 27417->27421 27418 7ff663c434cc 27436 7ff663c528d0 104 API calls 27418->27436 27419 7ff663c434eb 27420 7ff663c435cb 27419->27420 27442 7ff663c52aa0 101 API calls 27419->27442 27420->27412 27425 7ff663c435d7 27420->27425 27421->27416 27421->27417 27423 7ff663c4370c 27421->27423 27437 7ff663c52aa0 101 API calls 27421->27437 27422 7ff663c43740 27422->27416 27426 7ff663c4384d 27422->27426 27439 7ff663c52bb0 101 API calls 27422->27439 27423->27416 27423->27422 27701 7ff663c428a4 82 API calls 2 library calls 27423->27701 27425->27416 27427 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27425->27427 27426->27416 27428 7ff663c420b0 33 API calls 27426->27428 27429 7ff663c43891 27427->27429 27428->27416 27429->27340 27430 7ff663c435a7 27430->27420 27438 7ff663c528d0 104 API calls 27430->27438 27431 7ff663c469f8 141 API calls 27432 7ff663c4378e 27431->27432 27432->27431 27433 7ff663c43803 27432->27433 27440 7ff663c52aa0 101 API calls 27432->27440 27435 7ff663c52aa0 101 API calls 27433->27435 27434->27414 27435->27426 27436->27419 27437->27421 27438->27420 27439->27432 27440->27432 27441->27418 27442->27430 27444 7ff663c43af9 27443->27444 27445 7ff663c43b55 27443->27445 27702 7ff663c43378 27444->27702 27447 7ff663c72320 _handle_error 8 API calls 27445->27447 27449 7ff663c43b67 27447->27449 27449->27348 27682 7ff663c48d04 33 API calls 2 library calls 27449->27682 27450 7ff663c43b6c 27451 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27450->27451 27452 7ff663c43b71 27451->27452 27923 7ff663c5886c 27453->27923 27455 7ff663c4f8ba 27927 7ff663c5ef60 GetSystemTime SystemTimeToFileTime 27455->27927 27458 7ff663c60994 27459 7ff663c70340 27458->27459 27460 7ff663c57df4 47 API calls 27459->27460 27461 7ff663c70373 27460->27461 27462 7ff663c5aae0 48 API calls 27461->27462 27463 7ff663c70387 27462->27463 27464 7ff663c5da98 48 API calls 27463->27464 27465 7ff663c70397 27464->27465 27466 7ff663c41fa0 31 API calls 27465->27466 27467 7ff663c703a2 27466->27467 27936 7ff663c6fc68 27467->27936 27470 7ff663c41fa0 31 API calls 27475 7ff663c46a0e 27474->27475 27479 7ff663c46a0a 27474->27479 27484 7ff663c52bb0 101 API calls 27475->27484 27476 7ff663c46a1b 27477 7ff663c46a2f 27476->27477 27478 7ff663c46a3e 27476->27478 27477->27479 27948 7ff663c45e24 27477->27948 28031 7ff663c45130 130 API calls 2 library calls 27478->28031 27479->27356 27482 7ff663c46a3c 27482->27479 28032 7ff663c4466c 82 API calls 27482->28032 27484->27476 27486 7ff663c4f978 27485->27486 27490 7ff663c4f9b0 27486->27490 27545 7ff663c4fa34 27486->27545 28147 7ff663c6612c 146 API calls 3 library calls 27486->28147 27488 7ff663c51189 27491 7ff663c5118e 27488->27491 27492 7ff663c511e1 27488->27492 27489 7ff663c72320 _handle_error 8 API calls 27493 7ff663c511c4 27489->27493 27490->27488 27495 7ff663c4f9d0 27490->27495 27490->27545 27491->27545 28199 7ff663c4dd08 179 API calls 27491->28199 27492->27545 28200 7ff663c6612c 146 API calls 3 library calls 27492->28200 27493->27356 27495->27545 28068 7ff663c49bb0 27495->28068 27498 7ff663c4fad6 28081 7ff663c55ef8 27498->28081 27501 7ff663c4fb7a 27661 7ff663c52aa0 101 API calls 27501->27661 27503 7ff663c4fb5e 27503->27501 28149 7ff663c57c94 47 API calls 2 library calls 27503->28149 27505 7ff663c4fbd7 27545->27489 27661->27505 27663 7ff663c42c74 27662->27663 27667 7ff663c42c88 27662->27667 27663->27667 28308 7ff663c42d80 108 API calls _invalid_parameter_noinfo_noreturn 27663->28308 27664 7ff663c41fa0 31 API calls 27668 7ff663c42ca1 27664->27668 27667->27664 27670 7ff663c42d64 27668->27670 28286 7ff663c43090 27668->28286 27669 7ff663c42d08 27671 7ff663c43090 31 API calls 27669->27671 27672 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27670->27672 27673 7ff663c42d14 27671->27673 27674 7ff663c42d7c 27672->27674 27675 7ff663c41fa0 31 API calls 27673->27675 27676 7ff663c42d20 27675->27676 28294 7ff663c5878c 27676->28294 27682->27351 27683->27353 27684->27360 27686 7ff663c54d32 memcpy_s 27685->27686 27695 7ff663c54bac 27686->27695 27688 7ff663c54d54 27689 7ff663c54d90 27688->27689 27691 7ff663c54dae 27688->27691 27690 7ff663c72320 _handle_error 8 API calls 27689->27690 27692 7ff663c42b32 27690->27692 27693 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27691->27693 27692->27337 27692->27406 27694 7ff663c54db3 27693->27694 27696 7ff663c54c27 27695->27696 27698 7ff663c54c2f BuildCatchObjectHelperInternal 27695->27698 27697 7ff663c41fa0 31 API calls 27696->27697 27697->27698 27698->27688 27699->27408 27700->27416 27701->27422 27703 7ff663c4339a 27702->27703 27706 7ff663c43396 27702->27706 27708 7ff663c43294 27703->27708 27706->27445 27706->27450 27707 7ff663c52aa0 101 API calls 27707->27706 27709 7ff663c432bb 27708->27709 27710 7ff663c432f6 27708->27710 27711 7ff663c469f8 141 API calls 27709->27711 27716 7ff663c46e74 27710->27716 27714 7ff663c432db 27711->27714 27714->27707 27720 7ff663c46e95 27716->27720 27717 7ff663c469f8 141 API calls 27717->27720 27718 7ff663c4331d 27718->27714 27721 7ff663c43904 27718->27721 27720->27717 27720->27718 27748 7ff663c5e808 27720->27748 27756 7ff663c46a7c 27721->27756 27724 7ff663c4396a 27726 7ff663c43989 27724->27726 27727 7ff663c4399a 27724->27727 27788 7ff663c60d54 27726->27788 27731 7ff663c439a3 27727->27731 27734 7ff663c439ec 27727->27734 27728 7ff663c72320 _handle_error 8 API calls 27730 7ff663c43a9e 27728->27730 27730->27714 27793 7ff663c60c80 33 API calls 27731->27793 27732 7ff663c43ab3 27735 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27732->27735 27733 7ff663c43a8a 27733->27728 27794 7ff663c426b4 33 API calls BuildCatchObjectHelperInternal 27734->27794 27737 7ff663c43ab8 27735->27737 27741 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27737->27741 27738 7ff663c439b0 27742 7ff663c41fa0 31 API calls 27738->27742 27746 7ff663c439c0 BuildCatchObjectHelperInternal 27738->27746 27740 7ff663c43a13 27795 7ff663c60ae8 34 API calls _invalid_parameter_noinfo_noreturn 27740->27795 27745 7ff663c43abe 27741->27745 27742->27746 27743 7ff663c41fa0 31 API calls 27747 7ff663c4394f 27743->27747 27746->27743 27747->27732 27747->27733 27747->27737 27749 7ff663c5e811 27748->27749 27750 7ff663c5e82b 27749->27750 27754 7ff663c4b664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27749->27754 27752 7ff663c5e845 SetThreadExecutionState 27750->27752 27755 7ff663c4b664 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27750->27755 27754->27750 27755->27752 27757 7ff663c46a96 _snwprintf 27756->27757 27758 7ff663c46ae4 27757->27758 27759 7ff663c46ac4 27757->27759 27761 7ff663c46d4d 27758->27761 27763 7ff663c46b0f 27758->27763 27834 7ff663c428a4 82 API calls 2 library calls 27759->27834 27863 7ff663c428a4 82 API calls 2 library calls 27761->27863 27778 7ff663c46ad0 27763->27778 27796 7ff663c61f94 27763->27796 27764 7ff663c72320 _handle_error 8 API calls 27765 7ff663c4394b 27764->27765 27765->27724 27765->27747 27792 7ff663c42794 33 API calls __std_swap_ranges_trivially_swappable 27765->27792 27768 7ff663c46b85 27769 7ff663c46c2a 27768->27769 27787 7ff663c46b7b 27768->27787 27840 7ff663c58968 109 API calls 27768->27840 27805 7ff663c54760 27769->27805 27770 7ff663c46b80 27770->27768 27836 7ff663c440b0 27770->27836 27771 7ff663c46b6e 27835 7ff663c428a4 82 API calls 2 library calls 27771->27835 27777 7ff663c46c52 27779 7ff663c46cc7 27777->27779 27780 7ff663c46cd1 27777->27780 27778->27764 27809 7ff663c51794 27779->27809 27841 7ff663c61f20 27780->27841 27783 7ff663c46ccf 27861 7ff663c54700 8 API calls _handle_error 27783->27861 27785 7ff663c46cfd 27785->27787 27862 7ff663c4433c 82 API calls 2 library calls 27785->27862 27824 7ff663c61870 27787->27824 27790 7ff663c60d8c 27788->27790 27789 7ff663c60f48 27789->27747 27790->27789 27791 7ff663c41744 33 API calls 27790->27791 27791->27790 27792->27724 27793->27738 27794->27740 27795->27747 27797 7ff663c62056 std::bad_alloc::bad_alloc 27796->27797 27800 7ff663c61fc5 std::bad_alloc::bad_alloc 27796->27800 27799 7ff663c74078 Concurrency::cancel_current_task 2 API calls 27797->27799 27798 7ff663c46b59 27798->27768 27798->27770 27798->27771 27799->27800 27800->27798 27801 7ff663c74078 Concurrency::cancel_current_task 2 API calls 27800->27801 27802 7ff663c6200f std::bad_alloc::bad_alloc 27800->27802 27801->27802 27802->27798 27803 7ff663c74078 Concurrency::cancel_current_task 2 API calls 27802->27803 27804 7ff663c620a9 27803->27804 27806 7ff663c54780 27805->27806 27808 7ff663c5478a 27805->27808 27807 7ff663c721d0 33 API calls 27806->27807 27807->27808 27808->27777 27810 7ff663c517be memcpy_s 27809->27810 27864 7ff663c58a48 27810->27864 27812 7ff663c51856 27812->27783 27813 7ff663c517f2 27815 7ff663c58a48 151 API calls 27813->27815 27816 7ff663c51830 27813->27816 27874 7ff663c58c4c 27813->27874 27815->27813 27816->27812 27817 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27816->27817 27820 7ff663c51882 27817->27820 27825 7ff663c6188e 27824->27825 27827 7ff663c618a1 27825->27827 27880 7ff663c5e948 27825->27880 27831 7ff663c618d8 27827->27831 27887 7ff663c7236c 27827->27887 27829 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27830 7ff663c61ad0 27829->27830 27833 7ff663c61a37 27831->27833 27891 7ff663c5a984 31 API calls _invalid_parameter_noinfo_noreturn 27831->27891 27833->27829 27834->27778 27835->27787 27837 7ff663c440d7 memcpy_s 27836->27837 27838 7ff663c440dd 27836->27838 27837->27768 27838->27837 27892 7ff663c44120 33 API calls 2 library calls 27838->27892 27840->27769 27842 7ff663c61f29 27841->27842 27843 7ff663c61f5d 27842->27843 27844 7ff663c61f55 27842->27844 27845 7ff663c61f49 27842->27845 27843->27783 27914 7ff663c63964 156 API calls 27844->27914 27893 7ff663c620ac 27845->27893 27848 7ff663c58a48 151 API calls 27856 7ff663c64733 BuildCatchObjectHelperInternal 27848->27856 27849 7ff663c64ad7 27903 7ff663c63484 27849->27903 27856->27848 27856->27849 27897 7ff663c5e9dc 27856->27897 27915 7ff663c62ab0 151 API calls 27856->27915 27916 7ff663c64b98 151 API calls 27856->27916 27917 7ff663c5ecd8 27856->27917 27921 7ff663c623a0 113 API calls 27856->27921 27922 7ff663c653f0 156 API calls 27856->27922 27861->27785 27862->27787 27863->27778 27866 7ff663c58a91 BuildCatchObjectHelperInternal 27864->27866 27867 7ff663c58bcd 27864->27867 27865 7ff663c58c1a 27868 7ff663c5e808 SetThreadExecutionState RtlPcToFileHeader RaiseException 27865->27868 27866->27867 27870 7ff663c6612c 146 API calls 27866->27870 27871 7ff663c58c1f 27866->27871 27872 7ff663c54888 108 API calls 27866->27872 27873 7ff663c528d0 104 API calls 27866->27873 27867->27865 27869 7ff663c4a174 8 API calls 27867->27869 27868->27871 27869->27865 27870->27866 27871->27813 27872->27866 27873->27866 27875 7ff663c58c8b 27874->27875 27877 7ff663c58c72 BuildCatchObjectHelperInternal 27874->27877 27876 7ff663c52ce0 104 API calls 27875->27876 27875->27877 27876->27877 27878 7ff663c58cb9 27877->27878 27879 7ff663c54888 108 API calls 27877->27879 27879->27878 27881 7ff663c5ecd8 103 API calls 27880->27881 27882 7ff663c5e95f ReleaseSemaphore 27881->27882 27883 7ff663c5e9a3 DeleteCriticalSection CloseHandle CloseHandle 27882->27883 27884 7ff663c5e984 27882->27884 27885 7ff663c5ea5c 101 API calls 27884->27885 27886 7ff663c5e98e CloseHandle 27885->27886 27886->27883 27886->27884 27888 7ff663c7239f 27887->27888 27889 7ff663c723c8 27888->27889 27890 7ff663c61870 108 API calls 27888->27890 27889->27831 27890->27888 27891->27833 27895 7ff663c620c8 memcpy_s 27893->27895 27894 7ff663c621ba 27894->27856 27895->27894 27896 7ff663c4b75c 82 API calls 27895->27896 27896->27895 27914->27843 27915->27856 27916->27856 27921->27856 27922->27856 27924 7ff663c58882 27923->27924 27925 7ff663c58892 27923->27925 27930 7ff663c523f0 27924->27930 27925->27455 27928 7ff663c72320 _handle_error 8 API calls 27927->27928 27929 7ff663c4f7dc 27928->27929 27929->27356 27929->27458 27931 7ff663c5240f 27930->27931 27934 7ff663c52aa0 101 API calls 27931->27934 27932 7ff663c52428 27935 7ff663c52bb0 101 API calls 27932->27935 27933 7ff663c52438 27933->27925 27934->27932 27935->27933 27937 7ff663c6fc94 27936->27937 27938 7ff663c4129c 33 API calls 27937->27938 27939 7ff663c6fca4 27938->27939 27940 7ff663c6f0a4 24 API calls 27939->27940 27941 7ff663c6fcb1 27940->27941 27942 7ff663c6fceb 27941->27942 27944 7ff663c6fd03 27941->27944 27943 7ff663c72320 _handle_error 8 API calls 27942->27943 27945 7ff663c6fcfd 27943->27945 27946 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27944->27946 27945->27470 27947 7ff663c6fd08 27946->27947 27949 7ff663c45e67 27948->27949 27950 7ff663c45ea5 27949->27950 27957 7ff663c45eb7 27949->27957 27979 7ff663c46084 27949->27979 28043 7ff663c428a4 82 API calls 2 library calls 27950->28043 27953 7ff663c46134 28050 7ff663c46fcc 82 API calls 27953->28050 27955 7ff663c469af 27959 7ff663c72320 _handle_error 8 API calls 27955->27959 27956 7ff663c45f44 28045 7ff663c46d88 82 API calls 27956->28045 27957->27953 27957->27956 28044 7ff663c46f38 33 API calls BuildCatchObjectHelperInternal 27957->28044 27962 7ff663c469c3 27959->27962 27961 7ff663c469e4 27963 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27961->27963 27962->27482 27967 7ff663c469e9 27963->27967 27964 7ff663c46973 27993 7ff663c45eb2 27964->27993 28062 7ff663c4466c 82 API calls 27964->28062 27970 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27967->27970 27968 7ff663c4612e 27968->27953 27968->27964 27972 7ff663c585f0 104 API calls 27968->27972 27969 7ff663c46034 27973 7ff663c7236c 108 API calls 27969->27973 27969->27979 27971 7ff663c469ef 27970->27971 27975 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 27971->27975 27974 7ff663c461a4 27972->27974 27976 7ff663c4606e 27973->27976 27974->27953 27983 7ff663c461ac 27974->27983 27977 7ff663c469f5 27975->27977 27978 7ff663c7236c 108 API calls 27976->27978 27978->27979 28033 7ff663c585f0 27979->28033 27980 7ff663c46097 28049 7ff663c4433c 82 API calls 2 library calls 27980->28049 27985 7ff663c4623f 27983->27985 28051 7ff663c4466c 82 API calls 27983->28051 27984 7ff663c45f5d 27984->27969 27984->27980 28046 7ff663c4433c 82 API calls 2 library calls 27984->28046 28047 7ff663c46d88 82 API calls 27984->28047 28048 7ff663c4a1a0 109 API calls _handle_error 27984->28048 27985->27964 27992 7ff663c46266 27985->27992 27987 7ff663c460a1 27989 7ff663c7236c 108 API calls 27987->27989 27987->27993 27990 7ff663c460f4 27989->27990 27991 7ff663c7236c 108 API calls 27990->27991 27991->27993 27996 7ff663c468b7 27992->27996 27997 7ff663c462ce 27992->27997 27993->27955 27993->27961 27993->27971 28031->27482 28034 7ff663c5869a 28033->28034 28035 7ff663c58614 28033->28035 28036 7ff663c440b0 33 API calls 28034->28036 28041 7ff663c5867c 28034->28041 28037 7ff663c440b0 33 API calls 28035->28037 28035->28041 28038 7ff663c586b3 28036->28038 28039 7ff663c5864d 28037->28039 28042 7ff663c528d0 104 API calls 28038->28042 28063 7ff663c4a174 28039->28063 28041->27968 28042->28041 28043->27993 28045->27984 28046->27984 28047->27984 28048->27984 28049->27987 28050->27993 28064 7ff663c4a185 28063->28064 28065 7ff663c4a19a 28064->28065 28067 7ff663c5af18 8 API calls 2 library calls 28064->28067 28065->28041 28067->28065 28073 7ff663c49be7 28068->28073 28069 7ff663c49c1b 28070 7ff663c72320 _handle_error 8 API calls 28069->28070 28071 7ff663c49c9d 28070->28071 28071->27498 28073->28069 28077 7ff663c49cae 28073->28077 28080 7ff663c49c83 28073->28080 28201 7ff663c55294 28073->28201 28219 7ff663c5db60 28073->28219 28074 7ff663c41fa0 31 API calls 28074->28069 28076 7ff663c49cbf 28079 7ff663c420b0 33 API calls 28076->28079 28076->28080 28077->28076 28223 7ff663c5da48 CompareStringW 28077->28223 28079->28080 28080->28074 28094 7ff663c55f3a 28081->28094 28082 7ff663c5619b 28084 7ff663c72320 _handle_error 8 API calls 28082->28084 28083 7ff663c561ce 28227 7ff663c4704c 47 API calls BuildCatchObjectHelperInternal 28083->28227 28085 7ff663c4fb29 28084->28085 28085->27501 28148 7ff663c57c94 47 API calls 2 library calls 28085->28148 28087 7ff663c4129c 33 API calls 28089 7ff663c56129 28087->28089 28088 7ff663c561d4 28090 7ff663c41fa0 31 API calls 28089->28090 28091 7ff663c5613b BuildCatchObjectHelperInternal 28089->28091 28090->28091 28091->28082 28092 7ff663c561c9 28091->28092 28093 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 28092->28093 28093->28083 28094->28082 28094->28083 28094->28087 28147->27490 28148->27503 28149->27501 28199->27545 28200->27545 28202 7ff663c552d4 28201->28202 28206 7ff663c55312 __vcrt_InitializeCriticalSectionEx 28202->28206 28209 7ff663c55339 __vcrt_InitializeCriticalSectionEx 28202->28209 28224 7ff663c613f4 CompareStringW 28202->28224 28203 7ff663c72320 _handle_error 8 API calls 28205 7ff663c55503 28203->28205 28205->28073 28208 7ff663c55382 __vcrt_InitializeCriticalSectionEx 28206->28208 28206->28209 28225 7ff663c613f4 CompareStringW 28206->28225 28208->28209 28210 7ff663c4129c 33 API calls 28208->28210 28216 7ff663c55439 28208->28216 28209->28203 28211 7ff663c55426 28210->28211 28213 7ff663c572cc 8 API calls 28211->28213 28212 7ff663c55489 28212->28209 28226 7ff663c613f4 CompareStringW 28212->28226 28213->28216 28214 7ff663c5551b 28217 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 28214->28217 28216->28212 28216->28214 28218 7ff663c55520 28217->28218 28221 7ff663c5db73 28219->28221 28220 7ff663c5db91 28220->28073 28221->28220 28222 7ff663c420b0 33 API calls 28221->28222 28222->28220 28223->28076 28224->28206 28225->28208 28226->28209 28227->28088 28287 7ff663c41fa0 31 API calls 28286->28287 28288 7ff663c430a5 28287->28288 28289 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 28288->28289 28290 7ff663c430fd 28289->28290 28291 7ff663c5b825 28290->28291 28292 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 28290->28292 28291->27669 28293 7ff663c5b846 28292->28293 28295 7ff663c587af 28294->28295 28297 7ff663c587df 28294->28297 28296 7ff663c7236c 108 API calls 28295->28296 28298 7ff663c587ca 28296->28298 28299 7ff663c7236c 108 API calls 28297->28299 28307 7ff663c5882b 28297->28307 28302 7ff663c7236c 108 API calls 28298->28302 28303 7ff663c58814 28299->28303 28301 7ff663c58845 28304 7ff663c5461c 108 API calls 28301->28304 28302->28297 28305 7ff663c7236c 108 API calls 28303->28305 28306 7ff663c58851 28304->28306 28305->28307 28309 7ff663c5461c 28307->28309 28308->27667 28310 7ff663c54632 28309->28310 28312 7ff663c5463a 28309->28312 28311 7ff663c5e948 108 API calls 28310->28311 28311->28312 28312->28301 28314 7ff663c51681 28313->28314 28316 7ff663c5163e 28313->28316 28317 7ff663c41fa0 31 API calls 28314->28317 28323 7ff663c516a0 28314->28323 28315 7ff663c4e600 31 API calls 28321 7ff663c516de 28315->28321 28316->28314 28318 7ff663c531bc 51 API calls 28316->28318 28317->28314 28318->28316 28319 7ff663c5175b 28322 7ff663c72320 _handle_error 8 API calls 28319->28322 28320 7ff663c5178d 28325 7ff663c77904 _invalid_parameter_noinfo_noreturn 31 API calls 28320->28325 28321->28319 28321->28320 28324 7ff663c4e58a 28322->28324 28323->28315 28324->27294 28324->27295 28326 7ff663c51792 28325->28326 28327->27005 28328->27009 28329->27012 28331 7ff663c71491 28332 7ff663c713c9 28331->28332 28332->28331 28333 7ff663c71900 _com_raise_error 14 API calls 28332->28333 28333->28332 28334 7ff663c711cf 28335 7ff663c71102 28334->28335 28336 7ff663c71900 _com_raise_error 14 API calls 28335->28336 28336->28335
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item$Message$_invalid_parameter_noinfo_noreturn$Send$Text$File$ErrorLast$CloseDialogFindFocusLoadStringViewWindow$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleIdleInputLineMappingParamShellSleepTickTranslateUnmapWait
                                                                                    • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                                                                    • API String ID: 2843345789-2702805183
                                                                                    • Opcode ID: edeb6bfabd7eaeb7cd9bcc304c0296b3610e9c120c931593e8c7bda36bba63fc
                                                                                    • Instruction ID: 6fb1d0804cd365a7e14901b5996b5d217cc521cedd9f31f58bac1c3e5fa534eb
                                                                                    • Opcode Fuzzy Hash: edeb6bfabd7eaeb7cd9bcc304c0296b3610e9c120c931593e8c7bda36bba63fc
                                                                                    • Instruction Fuzzy Hash: 4CD2B262E09782D2EA209B66E8562F96371FF86790F404131F94DAF7AADF3CE544C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$FileMessageMoveSend$ItemPathTemp
                                                                                    • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                                                                    • API String ID: 1275900774-3916287355
                                                                                    • Opcode ID: cac509c614b203b8349121355fbb87f3211af6ba43052407af84ed962e8e34b6
                                                                                    • Instruction ID: 06a88dcf12901bf87f36ff0981376cc5a102d4f3b9988e198c4aa2abad431677
                                                                                    • Opcode Fuzzy Hash: cac509c614b203b8349121355fbb87f3211af6ba43052407af84ed962e8e34b6
                                                                                    • Instruction Fuzzy Hash: 6C13AD32A04B82C9EB109F75D8462FC27B1EB41398F501536EA5DABBDADF38E595C340

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1474 7ff663c70754-7ff663c70829 call 7ff663c5dfd0 call 7ff663c562dc call 7ff663c6946c call 7ff663c73cf0 call 7ff663c69a14 1485 7ff663c7082b-7ff663c70840 1474->1485 1486 7ff663c70860-7ff663c70883 1474->1486 1487 7ff663c7085b call 7ff663c7220c 1485->1487 1488 7ff663c70842-7ff663c70855 1485->1488 1489 7ff663c708ba-7ff663c708dd 1486->1489 1490 7ff663c70885-7ff663c7089a 1486->1490 1487->1486 1488->1487 1493 7ff663c70ddd-7ff663c70de2 call 7ff663c77904 1488->1493 1491 7ff663c70914-7ff663c70937 1489->1491 1492 7ff663c708df-7ff663c708f4 1489->1492 1495 7ff663c7089c-7ff663c708af 1490->1495 1496 7ff663c708b5 call 7ff663c7220c 1490->1496 1499 7ff663c70939-7ff663c7094e 1491->1499 1500 7ff663c7096e-7ff663c7097a GetCommandLineW 1491->1500 1497 7ff663c708f6-7ff663c70909 1492->1497 1498 7ff663c7090f call 7ff663c7220c 1492->1498 1512 7ff663c70de3-7ff663c70e2f call 7ff663c77904 call 7ff663c71900 1493->1512 1495->1493 1495->1496 1496->1489 1497->1493 1497->1498 1498->1491 1504 7ff663c70969 call 7ff663c7220c 1499->1504 1505 7ff663c70950-7ff663c70963 1499->1505 1506 7ff663c70b47-7ff663c70b5e call 7ff663c56454 1500->1506 1507 7ff663c70980-7ff663c709b7 call 7ff663c7797c call 7ff663c4129c call 7ff663c6cad0 1500->1507 1504->1500 1505->1493 1505->1504 1516 7ff663c70b89-7ff663c70cce call 7ff663c41fa0 SetEnvironmentVariableW GetLocalTime call 7ff663c53e28 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff663c6b014 call 7ff663c598ac call 7ff663c667b4 * 2 DialogBoxParamW call 7ff663c668a8 1506->1516 1517 7ff663c70b60-7ff663c70b85 call 7ff663c41fa0 call 7ff663c73640 1506->1517 1532 7ff663c709ec-7ff663c709f3 1507->1532 1533 7ff663c709b9-7ff663c709cc 1507->1533 1529 7ff663c70e34-7ff663c70e6a 1512->1529 1569 7ff663c70cd3-7ff663c70ce4 call 7ff663c668a8 1516->1569 1517->1516 1534 7ff663c70e6c 1529->1534 1539 7ff663c70adb-7ff663c70b12 call 7ff663c7797c call 7ff663c4129c call 7ff663c6fd0c 1532->1539 1540 7ff663c709f9-7ff663c70a13 OpenFileMappingW 1532->1540 1537 7ff663c709e7 call 7ff663c7220c 1533->1537 1538 7ff663c709ce-7ff663c709e1 1533->1538 1534->1534 1537->1532 1538->1512 1538->1537 1539->1506 1563 7ff663c70b14-7ff663c70b27 1539->1563 1544 7ff663c70a19-7ff663c70a39 MapViewOfFile 1540->1544 1545 7ff663c70ad0-7ff663c70ad9 CloseHandle 1540->1545 1544->1545 1548 7ff663c70a3f-7ff663c70a6f UnmapViewOfFile MapViewOfFile 1544->1548 1545->1506 1548->1545 1552 7ff663c70a71-7ff663c70aca call 7ff663c6a190 call 7ff663c6fd0c call 7ff663c5b9b4 call 7ff663c5bb00 call 7ff663c5bb70 UnmapViewOfFile 1548->1552 1552->1545 1566 7ff663c70b29-7ff663c70b3c 1563->1566 1567 7ff663c70b42 call 7ff663c7220c 1563->1567 1566->1567 1570 7ff663c70dd7-7ff663c70ddc call 7ff663c77904 1566->1570 1567->1506 1580 7ff663c70cec-7ff663c70cf3 1569->1580 1581 7ff663c70ce6 Sleep 1569->1581 1570->1493 1583 7ff663c70cfa-7ff663c70d1d call 7ff663c5b8e0 call 7ff663cae0f0 1580->1583 1584 7ff663c70cf5 call 7ff663c69f4c 1580->1584 1581->1580 1590 7ff663c70d25-7ff663c70d2c 1583->1590 1591 7ff663c70d1f call 7ff663cae0f0 1583->1591 1584->1583 1593 7ff663c70d48-7ff663c70d59 1590->1593 1594 7ff663c70d2e-7ff663c70d35 1590->1594 1591->1590 1596 7ff663c70d6d-7ff663c70d7a 1593->1596 1597 7ff663c70d5b-7ff663c70d67 call 7ff663c6fe24 CloseHandle 1593->1597 1594->1593 1595 7ff663c70d37-7ff663c70d43 call 7ff663c4ba0c 1594->1595 1595->1593 1600 7ff663c70d7c-7ff663c70d89 1596->1600 1601 7ff663c70d9f-7ff663c70dd6 call 7ff663c694e4 call 7ff663c72320 1596->1601 1597->1596 1604 7ff663c70d8b-7ff663c70d93 1600->1604 1605 7ff663c70d99-7ff663c70d9b 1600->1605 1604->1601 1608 7ff663c70d95-7ff663c70d97 1604->1608 1605->1601 1606 7ff663c70d9d 1605->1606 1606->1601 1608->1601
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$EnvironmentHandleVariableView$_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDirectoryModuleProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                                                                    • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                    • API String ID: 3400486126-3710569615
                                                                                    • Opcode ID: 915dcf94f2fc9226729027f2c98a7d2c819f7627f6a6cfa0c301de63e570f219
                                                                                    • Instruction ID: aae0650b347252c1540bea860db78b535d1c9ce59713687e4eebf46f68851bf4
                                                                                    • Opcode Fuzzy Hash: 915dcf94f2fc9226729027f2c98a7d2c819f7627f6a6cfa0c301de63e570f219
                                                                                    • Instruction Fuzzy Hash: A0127261A18B86D6EB109B25E8462B97371FF85794F404231FA9DAABA9DF3DF140D300

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWideswprintf
                                                                                    • String ID: $%s:$CAPTION
                                                                                    • API String ID: 2100155373-404845831
                                                                                    • Opcode ID: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                    • Instruction ID: c20cf3e4bb52bbe0a51bfe952cb1c37089ba043914e28089e4caadf80418b11a
                                                                                    • Opcode Fuzzy Hash: 1224945cd41bf140f0dcf37f1b002595631e4f701a4b658f84a72e9da714e3d9
                                                                                    • Instruction Fuzzy Hash: EE91B436A18641C6E714DF3AA8116A9A7B1FBC4784F445535FE49ABB98CE3CE805CB40

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                                    • String ID: PNG
                                                                                    • API String ID: 211097158-364855578
                                                                                    • Opcode ID: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                    • Instruction ID: 4c6ac83a71ebb144d1e88763ef989d8cdbd54ac08b2d09ec18d1270b49244bac
                                                                                    • Opcode Fuzzy Hash: c8606208415c3a11eb94d5df8c8f8595ea54109f2541637b646828bce78d4013
                                                                                    • Instruction Fuzzy Hash: 01413D25A09B12C2EF149B27D85577967B0BF8AB90F040435EE0DDB7A4EF7CE5488300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID: __tmp_reference_source_
                                                                                    • API String ID: 3668304517-685763994
                                                                                    • Opcode ID: 6851538e357941a99ebb696b081bc24ed3bcd29be91ebe21427510cb9cba344c
                                                                                    • Instruction ID: bf628beca7c7f5c35bb534a49e7c3badbe255944fcbff13a4f64ec0c82793b61
                                                                                    • Opcode Fuzzy Hash: 6851538e357941a99ebb696b081bc24ed3bcd29be91ebe21427510cb9cba344c
                                                                                    • Instruction Fuzzy Hash: ADE29672A086C2D2EA64CB25D4563BE67B1FB81794F404131EB9DAB7A6CF3CE465C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID: CMT
                                                                                    • API String ID: 3668304517-2756464174
                                                                                    • Opcode ID: 84bdbc0025f9110493083925689b4d7f895f5cf4e4c171c52cbbd829bd468cec
                                                                                    • Instruction ID: 3c89f98ac0bf6a8993000bbc69eb6b7fe6f713068d62ab5d4c5718e704bd64e7
                                                                                    • Opcode Fuzzy Hash: 84bdbc0025f9110493083925689b4d7f895f5cf4e4c171c52cbbd829bd468cec
                                                                                    • Instruction Fuzzy Hash: 31E2DC22B08682C6EB28DB65D5522FE77B1FB45794F400035EA5EABB96DF3CE465C300

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 3483 7ff663c540bc-7ff663c540f3 3484 7ff663c540f9-7ff663c54101 3483->3484 3485 7ff663c541d2-7ff663c541df FindNextFileW 3483->3485 3486 7ff663c54106-7ff663c54118 FindFirstFileW 3484->3486 3487 7ff663c54103 3484->3487 3488 7ff663c541f3-7ff663c541f6 3485->3488 3489 7ff663c541e1-7ff663c541f1 GetLastError 3485->3489 3486->3488 3492 7ff663c5411e-7ff663c54146 call 7ff663c56a0c 3486->3492 3487->3486 3490 7ff663c541f8-7ff663c54200 3488->3490 3491 7ff663c54211-7ff663c54253 call 7ff663c7797c call 7ff663c4129c call 7ff663c58090 3488->3491 3493 7ff663c541ca-7ff663c541cd 3489->3493 3495 7ff663c54202 3490->3495 3496 7ff663c54205-7ff663c5420c call 7ff663c420b0 3490->3496 3519 7ff663c5428c-7ff663c542e6 call 7ff663c5f168 * 3 3491->3519 3520 7ff663c54255-7ff663c5426c 3491->3520 3503 7ff663c54167-7ff663c54170 3492->3503 3504 7ff663c54148-7ff663c54164 FindFirstFileW 3492->3504 3498 7ff663c542eb-7ff663c5430e call 7ff663c72320 3493->3498 3495->3496 3496->3491 3507 7ff663c541a9-7ff663c541ad 3503->3507 3508 7ff663c54172-7ff663c54189 3503->3508 3504->3503 3507->3488 3512 7ff663c541af-7ff663c541be GetLastError 3507->3512 3510 7ff663c5418b-7ff663c5419e 3508->3510 3511 7ff663c541a4 call 7ff663c7220c 3508->3511 3510->3511 3514 7ff663c54315-7ff663c5431b call 7ff663c77904 3510->3514 3511->3507 3516 7ff663c541c8 3512->3516 3517 7ff663c541c0-7ff663c541c6 3512->3517 3516->3493 3517->3493 3517->3516 3519->3498 3523 7ff663c54287 call 7ff663c7220c 3520->3523 3524 7ff663c5426e-7ff663c54281 3520->3524 3523->3519 3524->3523 3527 7ff663c5430f-7ff663c54314 call 7ff663c77904 3524->3527 3527->3514
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                                                                    • String ID:
                                                                                    • API String ID: 474548282-0
                                                                                    • Opcode ID: 5b7a682f346ba33cc6e8113bf8bb974c5d06c867b30d63dc8f71ee7e42fd28a6
                                                                                    • Instruction ID: d6372e24618d3d75fd7efc71d4347bfae2912c492d5815018f65522cbc120d1b
                                                                                    • Opcode Fuzzy Hash: 5b7a682f346ba33cc6e8113bf8bb974c5d06c867b30d63dc8f71ee7e42fd28a6
                                                                                    • Instruction Fuzzy Hash: 88619372A18646C1DA108B25E84226E6371FB957B4F105331FAADABBD9DF3CE564C700
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: CMT
                                                                                    • API String ID: 0-2756464174
                                                                                    • Opcode ID: 1483503f4f6562bc116dab0f55c891e212737330d95d7192c6dc5e801ab4a3f4
                                                                                    • Instruction ID: a52fc4ed34d3cf779ff21349a6c898f46c78b4ade466950d01e1a03fc59ca92d
                                                                                    • Opcode Fuzzy Hash: 1483503f4f6562bc116dab0f55c891e212737330d95d7192c6dc5e801ab4a3f4
                                                                                    • Instruction Fuzzy Hash: 5A42AF22B08A82D6EB18DB74D1522FD67B1EB51754F400136EB5EAB79BDF38E568C300
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 00cc9b5d49baee892d39d1da46008d2b4229947a5b0a2c39888c4d08721f4c94
                                                                                    • Instruction ID: 7dda9045fd33c8c4d6e660b0dc581d0f76d66ce882602b29f9c9bf5a16277674
                                                                                    • Opcode Fuzzy Hash: 00cc9b5d49baee892d39d1da46008d2b4229947a5b0a2c39888c4d08721f4c94
                                                                                    • Instruction Fuzzy Hash: 0CE1E722A08282CAEB64CF2AA4562BD77B1FB46748F055135EB4EEB746DF3CE541C704
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3d9f1d4af68ebc00f7ab7abf4cea58f5074969ee2768498b55c72978f68bcf28
                                                                                    • Instruction ID: 11b12d6eba9e8c1e976afa96fa8c4511cf11f9c138709b569555ebade37dd772
                                                                                    • Opcode Fuzzy Hash: 3d9f1d4af68ebc00f7ab7abf4cea58f5074969ee2768498b55c72978f68bcf28
                                                                                    • Instruction Fuzzy Hash: B2B1E0A2B04BC992DE59CA66DA096F963B1B746FC4F488036EE0D6B751DF3CE155C300
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                    • String ID:
                                                                                    • API String ID: 3340455307-0
                                                                                    • Opcode ID: 351ceed20d24346c920f2b33a82c7c15764e1b5f9a2ac08ee0b3c21e451927ce
                                                                                    • Instruction ID: 7290c7ebd910d568f509b67dfcb6e62d7114a9912714054f32461c9fa5834609
                                                                                    • Opcode Fuzzy Hash: 351ceed20d24346c920f2b33a82c7c15764e1b5f9a2ac08ee0b3c21e451927ce
                                                                                    • Instruction Fuzzy Hash: E0412832B15696C6FBA4DF21E94376A2272FBC4B94F045030EE0DAB795CE3CE4628704

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 7ff663c5dfd0-7ff663c5e024 call 7ff663c72450 GetModuleHandleW 3 7ff663c5e07b-7ff663c5e3a5 0->3 4 7ff663c5e026-7ff663c5e039 GetProcAddress 0->4 5 7ff663c5e3ab-7ff663c5e3b4 call 7ff663c7b788 3->5 6 7ff663c5e503-7ff663c5e521 call 7ff663c56454 call 7ff663c57df4 3->6 7 7ff663c5e03b-7ff663c5e04a 4->7 8 7ff663c5e053-7ff663c5e066 GetProcAddress 4->8 5->6 16 7ff663c5e3ba-7ff663c5e3fd call 7ff663c56454 CreateFileW 5->16 19 7ff663c5e525-7ff663c5e52f call 7ff663c551a4 6->19 7->8 8->3 10 7ff663c5e068-7ff663c5e078 8->10 10->3 22 7ff663c5e403-7ff663c5e416 SetFilePointer 16->22 23 7ff663c5e4f0-7ff663c5e4fe CloseHandle call 7ff663c41fa0 16->23 27 7ff663c5e564-7ff663c5e5ac call 7ff663c7797c call 7ff663c4129c call 7ff663c58090 call 7ff663c41fa0 call 7ff663c532bc 19->27 28 7ff663c5e531-7ff663c5e53c call 7ff663c5dd88 19->28 22->23 25 7ff663c5e41c-7ff663c5e43e ReadFile 22->25 23->6 25->23 29 7ff663c5e444-7ff663c5e452 25->29 66 7ff663c5e5b1-7ff663c5e5b4 27->66 28->27 40 7ff663c5e53e-7ff663c5e562 CompareStringW 28->40 32 7ff663c5e458-7ff663c5e4ac call 7ff663c7797c call 7ff663c4129c 29->32 33 7ff663c5e800-7ff663c5e807 call 7ff663c72624 29->33 49 7ff663c5e4c3-7ff663c5e4d9 call 7ff663c5d0a0 32->49 40->27 43 7ff663c5e5bd-7ff663c5e5c6 40->43 43->19 47 7ff663c5e5cc 43->47 50 7ff663c5e5d1-7ff663c5e5d4 47->50 61 7ff663c5e4db-7ff663c5e4eb call 7ff663c41fa0 * 2 49->61 62 7ff663c5e4ae-7ff663c5e4be call 7ff663c5dd88 49->62 53 7ff663c5e5d6-7ff663c5e5d9 50->53 54 7ff663c5e63f-7ff663c5e642 50->54 59 7ff663c5e5dd-7ff663c5e62d call 7ff663c7797c call 7ff663c4129c call 7ff663c58090 call 7ff663c41fa0 call 7ff663c532bc 53->59 57 7ff663c5e648-7ff663c5e65b call 7ff663c57eb0 call 7ff663c551a4 54->57 58 7ff663c5e7c2-7ff663c5e7ff call 7ff663c41fa0 * 2 call 7ff663c72320 54->58 82 7ff663c5e706-7ff663c5e753 call 7ff663c5da98 AllocConsole 57->82 83 7ff663c5e661-7ff663c5e701 call 7ff663c5dd88 * 2 call 7ff663c5aae0 call 7ff663c5da98 call 7ff663c5aae0 call 7ff663c5dc2c call 7ff663c687ac call 7ff663c419e0 57->83 107 7ff663c5e63c 59->107 108 7ff663c5e62f-7ff663c5e638 59->108 61->23 62->49 73 7ff663c5e5b6 66->73 74 7ff663c5e5ce 66->74 73->43 74->50 94 7ff663c5e755-7ff663c5e7aa GetCurrentProcessId AttachConsole call 7ff663c5e868 call 7ff663c5e858 GetStdHandle WriteConsoleW Sleep FreeConsole 82->94 95 7ff663c5e7b0 82->95 100 7ff663c5e7b4-7ff663c5e7bb call 7ff663c419e0 ExitProcess 83->100 94->95 95->100 107->54 108->59 112 7ff663c5e63a 108->112 112->54
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                                                    • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                                                                    • API String ID: 1496594111-2013832382
                                                                                    • Opcode ID: bf3e3aa97e4221fedf22e700a2e9e8c0c09081c11d5f1b10540170e9206d2c43
                                                                                    • Instruction ID: 97fda54901c839e12ff9bf0c8ab8fb16d7f838541cbda1bf7e4b5b6830ef780d
                                                                                    • Opcode Fuzzy Hash: bf3e3aa97e4221fedf22e700a2e9e8c0c09081c11d5f1b10540170e9206d2c43
                                                                                    • Instruction Fuzzy Hash: 24321E31A09B82E5EB219F64E8421E937B4FF44354F501236EA4DABBA5EF3CE655C340
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C58E58: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF663C58F8D
                                                                                    • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF663C59F75
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C5A42F
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C5A435
                                                                                      • Part of subcall function 00007FF663C60BBC: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF663C60B44), ref: 00007FF663C60BE9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                                                                    • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                                                    • API String ID: 3629253777-3268106645
                                                                                    • Opcode ID: 96347e7981fae7733940ad93ba4258564ebec1a9a55cc8409c872ccb2165f156
                                                                                    • Instruction ID: 58dfe7c8cf89294468f9eaa04bdbe67e371adf8f1c83050c8a6713f687278268
                                                                                    • Opcode Fuzzy Hash: 96347e7981fae7733940ad93ba4258564ebec1a9a55cc8409c872ccb2165f156
                                                                                    • Instruction Fuzzy Hash: 6762CF76A19682D5EB11DB25C4462BE2371FB807A8F804131EA4EAB7D5EF3DE564C340

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1921 7ff663c71900-7ff663c71989 call 7ff663c71558 1924 7ff663c7198b-7ff663c719af call 7ff663c71868 RaiseException 1921->1924 1925 7ff663c719b4-7ff663c719d1 1921->1925 1931 7ff663c71bb8-7ff663c71bd5 1924->1931 1927 7ff663c719e6-7ff663c719ea 1925->1927 1928 7ff663c719d3-7ff663c719e4 1925->1928 1930 7ff663c719ed-7ff663c719f9 1927->1930 1928->1930 1932 7ff663c71a1a-7ff663c71a1d 1930->1932 1933 7ff663c719fb-7ff663c71a0d 1930->1933 1934 7ff663c71ac4-7ff663c71acb 1932->1934 1935 7ff663c71a23-7ff663c71a26 1932->1935 1943 7ff663c71b89-7ff663c71b93 1933->1943 1944 7ff663c71a13 1933->1944 1937 7ff663c71acd-7ff663c71adc 1934->1937 1938 7ff663c71adf-7ff663c71ae2 1934->1938 1939 7ff663c71a3d-7ff663c71a52 LoadLibraryExA 1935->1939 1940 7ff663c71a28-7ff663c71a3b 1935->1940 1937->1938 1945 7ff663c71ae8-7ff663c71aec 1938->1945 1946 7ff663c71b85 1938->1946 1941 7ff663c71aa9-7ff663c71ab2 1939->1941 1942 7ff663c71a54-7ff663c71a67 GetLastError 1939->1942 1940->1939 1940->1941 1953 7ff663c71abd 1941->1953 1954 7ff663c71ab4-7ff663c71ab7 FreeLibrary 1941->1954 1949 7ff663c71a69-7ff663c71a7c 1942->1949 1950 7ff663c71a7e-7ff663c71aa4 call 7ff663c71868 RaiseException 1942->1950 1951 7ff663c71b95-7ff663c71ba6 1943->1951 1952 7ff663c71bb0 call 7ff663c71868 1943->1952 1944->1932 1947 7ff663c71b1b-7ff663c71b2e GetProcAddress 1945->1947 1948 7ff663c71aee-7ff663c71af2 1945->1948 1946->1943 1947->1946 1960 7ff663c71b30-7ff663c71b43 GetLastError 1947->1960 1948->1947 1957 7ff663c71af4-7ff663c71aff 1948->1957 1949->1941 1949->1950 1950->1931 1951->1952 1963 7ff663c71bb5 1952->1963 1953->1934 1954->1953 1957->1947 1961 7ff663c71b01-7ff663c71b08 1957->1961 1965 7ff663c71b5a-7ff663c71b81 call 7ff663c71868 RaiseException call 7ff663c71558 1960->1965 1966 7ff663c71b45-7ff663c71b58 1960->1966 1961->1947 1967 7ff663c71b0a-7ff663c71b0f 1961->1967 1963->1931 1965->1946 1966->1946 1966->1965 1967->1947 1969 7ff663c71b11-7ff663c71b19 1967->1969 1969->1946 1969->1947
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                                                    • String ID: H
                                                                                    • API String ID: 3432403771-2852464175
                                                                                    • Opcode ID: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                    • Instruction ID: 99e2c1113ba114d5f9516f8d09c50e0eca8d4b9f3c9f6a153a07da2642df8126
                                                                                    • Opcode Fuzzy Hash: cf3fc932a6b7fb7fc9ef8320b4dd67bfc8d7ec91281715f792326570f1d4a57f
                                                                                    • Instruction Fuzzy Hash: 83915A72A05B52DAEB10CFA9D8566AC37B1FB08B98F054435EE0D6BB54EF38E545C340

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1974 7ff663c6f4e0-7ff663c6f523 1975 7ff663c6f529-7ff663c6f565 call 7ff663c73cf0 1974->1975 1976 7ff663c6f894-7ff663c6f8b9 call 7ff663c41fa0 call 7ff663c72320 1974->1976 1982 7ff663c6f56a-7ff663c6f571 1975->1982 1983 7ff663c6f567 1975->1983 1984 7ff663c6f582-7ff663c6f586 1982->1984 1985 7ff663c6f573-7ff663c6f577 1982->1985 1983->1982 1989 7ff663c6f58b-7ff663c6f596 1984->1989 1990 7ff663c6f588 1984->1990 1987 7ff663c6f57c-7ff663c6f580 1985->1987 1988 7ff663c6f579 1985->1988 1987->1989 1988->1987 1991 7ff663c6f59c 1989->1991 1992 7ff663c6f628 1989->1992 1990->1989 1993 7ff663c6f5a2-7ff663c6f5a9 1991->1993 1994 7ff663c6f62c-7ff663c6f62f 1992->1994 1995 7ff663c6f5ab 1993->1995 1996 7ff663c6f5ae-7ff663c6f5b3 1993->1996 1997 7ff663c6f637-7ff663c6f63a 1994->1997 1998 7ff663c6f631-7ff663c6f635 1994->1998 1995->1996 1999 7ff663c6f5e5-7ff663c6f5f0 1996->1999 2000 7ff663c6f5b5 1996->2000 2001 7ff663c6f660-7ff663c6f673 call 7ff663c563ac 1997->2001 2002 7ff663c6f63c-7ff663c6f643 1997->2002 1998->1997 1998->2001 2004 7ff663c6f5f5-7ff663c6f5fa 1999->2004 2005 7ff663c6f5f2 1999->2005 2006 7ff663c6f5ca-7ff663c6f5d0 2000->2006 2013 7ff663c6f698-7ff663c6f6ed call 7ff663c7797c call 7ff663c4129c call 7ff663c532a8 call 7ff663c41fa0 2001->2013 2014 7ff663c6f675-7ff663c6f693 call 7ff663c613c4 2001->2014 2002->2001 2007 7ff663c6f645-7ff663c6f65c 2002->2007 2009 7ff663c6f8ba-7ff663c6f8c1 2004->2009 2010 7ff663c6f600-7ff663c6f607 2004->2010 2005->2004 2011 7ff663c6f5b7-7ff663c6f5be 2006->2011 2012 7ff663c6f5d2 2006->2012 2007->2001 2017 7ff663c6f8c6-7ff663c6f8cb 2009->2017 2018 7ff663c6f8c3 2009->2018 2015 7ff663c6f60c-7ff663c6f612 2010->2015 2016 7ff663c6f609 2010->2016 2019 7ff663c6f5c3-7ff663c6f5c8 2011->2019 2020 7ff663c6f5c0 2011->2020 2012->1999 2041 7ff663c6f742-7ff663c6f74f ShellExecuteExW 2013->2041 2042 7ff663c6f6ef-7ff663c6f73d call 7ff663c7797c call 7ff663c4129c call 7ff663c55b60 call 7ff663c41fa0 2013->2042 2014->2013 2015->2009 2023 7ff663c6f618-7ff663c6f622 2015->2023 2016->2015 2024 7ff663c6f8cd-7ff663c6f8d4 2017->2024 2025 7ff663c6f8de-7ff663c6f8e6 2017->2025 2018->2017 2019->2006 2026 7ff663c6f5d4-7ff663c6f5db 2019->2026 2020->2019 2023->1992 2023->1993 2033 7ff663c6f8d9 2024->2033 2034 7ff663c6f8d6 2024->2034 2027 7ff663c6f8eb-7ff663c6f8f6 2025->2027 2028 7ff663c6f8e8 2025->2028 2029 7ff663c6f5dd 2026->2029 2030 7ff663c6f5e0 2026->2030 2027->1994 2028->2027 2029->2030 2030->1999 2033->2025 2034->2033 2044 7ff663c6f846-7ff663c6f84e 2041->2044 2045 7ff663c6f755-7ff663c6f75f 2041->2045 2042->2041 2046 7ff663c6f882-7ff663c6f88f 2044->2046 2047 7ff663c6f850-7ff663c6f866 2044->2047 2049 7ff663c6f761-7ff663c6f764 2045->2049 2050 7ff663c6f76f-7ff663c6f772 2045->2050 2046->1976 2051 7ff663c6f87d call 7ff663c7220c 2047->2051 2052 7ff663c6f868-7ff663c6f87b 2047->2052 2049->2050 2054 7ff663c6f766-7ff663c6f76d 2049->2054 2055 7ff663c6f774-7ff663c6f77f IsWindowVisible 2050->2055 2056 7ff663c6f78e-7ff663c6f7a1 WaitForInputIdle call 7ff663c6fe24 2050->2056 2051->2046 2052->2051 2058 7ff663c6f8fb-7ff663c6f903 call 7ff663c77904 2052->2058 2054->2050 2061 7ff663c6f7e3-7ff663c6f7f0 CloseHandle 2054->2061 2055->2056 2062 7ff663c6f781-7ff663c6f78c ShowWindow 2055->2062 2063 7ff663c6f7a6-7ff663c6f7ad 2056->2063 2066 7ff663c6f805-7ff663c6f80c 2061->2066 2067 7ff663c6f7f2-7ff663c6f803 call 7ff663c613c4 2061->2067 2062->2056 2063->2061 2068 7ff663c6f7af-7ff663c6f7b2 2063->2068 2072 7ff663c6f82e-7ff663c6f830 2066->2072 2073 7ff663c6f80e-7ff663c6f811 2066->2073 2067->2066 2067->2072 2068->2061 2074 7ff663c6f7b4-7ff663c6f7c5 GetExitCodeProcess 2068->2074 2072->2044 2078 7ff663c6f832-7ff663c6f835 2072->2078 2073->2072 2077 7ff663c6f813-7ff663c6f828 2073->2077 2074->2061 2079 7ff663c6f7c7-7ff663c6f7dc 2074->2079 2077->2072 2078->2044 2081 7ff663c6f837-7ff663c6f845 ShowWindow 2078->2081 2079->2061 2081->2044
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Show$CloseCodeExecuteExitHandleIdleInputProcessShellVisibleWait_invalid_parameter_noinfo_noreturn
                                                                                    • String ID: .exe$.inf$Install$p
                                                                                    • API String ID: 148627002-3607691742
                                                                                    • Opcode ID: ba68baa1d40b04d42f521f463501f8dbe15c8949e0b8882c71566322c056b8bc
                                                                                    • Instruction ID: 60676b6283854926521e7ceaa1b0040fc2ea6ce6ad23b474bfb1fb2e0621e461
                                                                                    • Opcode Fuzzy Hash: ba68baa1d40b04d42f521f463501f8dbe15c8949e0b8882c71566322c056b8bc
                                                                                    • Instruction Fuzzy Hash: 4BC17162F18602D9FB10DB66D95227D27B1BF8A784F045035EE4DABBA5DF3CE8618340

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3569833718-0
                                                                                    • Opcode ID: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                                                                    • Instruction ID: 25eea3102da7f3816aa894ff6c523e3a73c7619aa7f0d9564f2f8f54f1f307c2
                                                                                    • Opcode Fuzzy Hash: c58ef51af4c11ae469b78d40ba7290d4e9656f32b0895ce54e4debee0d1a06d9
                                                                                    • Instruction Fuzzy Hash: 6F41B371B14642CAF700CF71E812BAA3770FB85B98F442135ED0A6BB95CE7DE4458744
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: e994a9db728abc9e3b7c2f1aeddd0c1bbb8b4fdc17eb45be45aeabee48c93372
                                                                                    • Instruction ID: 8cc998b4be554f0209962eef8f2b69d7ad19af53c3ebea90831a7c52003c3e07
                                                                                    • Opcode Fuzzy Hash: e994a9db728abc9e3b7c2f1aeddd0c1bbb8b4fdc17eb45be45aeabee48c93372
                                                                                    • Instruction Fuzzy Hash: A4129062F08742C9FA10DB65D4462AD23B1EB457A8F404232EE5DABBDADF3CE585C340

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 3534 7ff663c524c0-7ff663c524fb 3535 7ff663c524fd-7ff663c52504 3534->3535 3536 7ff663c52506 3534->3536 3535->3536 3537 7ff663c52509-7ff663c52578 3535->3537 3536->3537 3538 7ff663c5257a 3537->3538 3539 7ff663c5257d-7ff663c525a8 CreateFileW 3537->3539 3538->3539 3540 7ff663c52688-7ff663c5268d 3539->3540 3541 7ff663c525ae-7ff663c525de GetLastError call 7ff663c56a0c 3539->3541 3542 7ff663c52693-7ff663c52697 3540->3542 3550 7ff663c5262c 3541->3550 3551 7ff663c525e0-7ff663c5262a CreateFileW GetLastError 3541->3551 3544 7ff663c52699-7ff663c5269c 3542->3544 3545 7ff663c526a5-7ff663c526a9 3542->3545 3544->3545 3547 7ff663c5269e 3544->3547 3548 7ff663c526ab-7ff663c526af 3545->3548 3549 7ff663c526cf-7ff663c526e3 3545->3549 3547->3545 3548->3549 3553 7ff663c526b1-7ff663c526c9 SetFileTime 3548->3553 3554 7ff663c5270c-7ff663c52735 call 7ff663c72320 3549->3554 3555 7ff663c526e5-7ff663c526f0 3549->3555 3552 7ff663c52632-7ff663c5263a 3550->3552 3551->3552 3556 7ff663c5263c-7ff663c52653 3552->3556 3557 7ff663c52673-7ff663c52686 3552->3557 3553->3549 3559 7ff663c52708 3555->3559 3560 7ff663c526f2-7ff663c526fa 3555->3560 3563 7ff663c52655-7ff663c52668 3556->3563 3564 7ff663c5266e call 7ff663c7220c 3556->3564 3557->3542 3559->3554 3561 7ff663c526fc 3560->3561 3562 7ff663c526ff-7ff663c52703 call 7ff663c420b0 3560->3562 3561->3562 3562->3559 3563->3564 3567 7ff663c52736-7ff663c5273b call 7ff663c77904 3563->3567 3564->3557
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3536497005-0
                                                                                    • Opcode ID: 7e74b88d639c8d570aa5cbccebcd9353285634c108726f52f9c563d03d833b9c
                                                                                    • Instruction ID: 844e817b994a160368c89f64c8bd78e7a7a9b5ce15cb950b05788891ae34d9fb
                                                                                    • Opcode Fuzzy Hash: 7e74b88d639c8d570aa5cbccebcd9353285634c108726f52f9c563d03d833b9c
                                                                                    • Instruction Fuzzy Hash: 4961D272A18781C5E7208B29E41236E67B1FB847B8F101334EEA96BBD8CF3DD0658704

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                                                    • String ID:
                                                                                    • API String ID: 3621893840-0
                                                                                    • Opcode ID: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                    • Instruction ID: eb5382de49a4c845a6d55e076a588a30add01bb72a600e2ea1affc2c76e03166
                                                                                    • Opcode Fuzzy Hash: eb57a341668d454e4e6cd52f39bb1811463ddcab187ea95c48cb89abc8d18535
                                                                                    • Instruction Fuzzy Hash: 83F04F21B28556C3FB508731E496A3A6271FFE4B05F441030F64E99A959E2DD149C700

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$DialogDispatchPeekTranslate
                                                                                    • String ID:
                                                                                    • API String ID: 1266772231-0
                                                                                    • Opcode ID: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                    • Instruction ID: 4a88f27510750fb0593f7da7a120fb361b147fa0c4a0db1bbd914a1954c7d7bb
                                                                                    • Opcode Fuzzy Hash: 8f901ab8bb575df3ccfb48a5cb3294f091b017f84468599a2020223c8e70b7dc
                                                                                    • Instruction Fuzzy Hash: 07F0EC25E38562C3FB509B21E8A6A3A6371FFD0705F806431F64E95A55DF2DD518CB00

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                    • String ID: EDIT
                                                                                    • API String ID: 4243998846-3080729518
                                                                                    • Opcode ID: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                    • Instruction ID: ab4d157ab468df105b3f767a5f21ae05b39dc40cf75c1ef11e6e21f189465022
                                                                                    • Opcode Fuzzy Hash: 5198dd27efd6ef2cfe81d4e1a42d30dc263c523227a297f5f4c02164b2b5e029
                                                                                    • Instruction Fuzzy Hash: C0018161B18A43C1FA609B22E8223B663B4AF99B44F441031ED4EAE795DE3CE149C680

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 3883 7ff663c52ce0-7ff663c52d0a 3884 7ff663c52d0c-7ff663c52d0e 3883->3884 3885 7ff663c52d13-7ff663c52d1b 3883->3885 3886 7ff663c52ea9-7ff663c52ec4 call 7ff663c72320 3884->3886 3887 7ff663c52d2b 3885->3887 3888 7ff663c52d1d-7ff663c52d28 GetStdHandle 3885->3888 3890 7ff663c52d31-7ff663c52d3d 3887->3890 3888->3887 3892 7ff663c52d86-7ff663c52da2 WriteFile 3890->3892 3893 7ff663c52d3f-7ff663c52d44 3890->3893 3896 7ff663c52da6-7ff663c52da9 3892->3896 3894 7ff663c52d46-7ff663c52d7a WriteFile 3893->3894 3895 7ff663c52daf-7ff663c52db3 3893->3895 3894->3896 3897 7ff663c52d7c-7ff663c52d82 3894->3897 3898 7ff663c52ea2-7ff663c52ea6 3895->3898 3899 7ff663c52db9-7ff663c52dbd 3895->3899 3896->3895 3896->3898 3897->3894 3900 7ff663c52d84 3897->3900 3898->3886 3899->3898 3901 7ff663c52dc3-7ff663c52dd8 call 7ff663c4b4f8 3899->3901 3900->3896 3904 7ff663c52dda-7ff663c52de1 3901->3904 3905 7ff663c52e1e-7ff663c52e6d call 7ff663c7797c call 7ff663c4129c call 7ff663c4bca8 3901->3905 3904->3890 3907 7ff663c52de7-7ff663c52de9 3904->3907 3905->3898 3916 7ff663c52e6f-7ff663c52e86 3905->3916 3907->3890 3909 7ff663c52def-7ff663c52e19 3907->3909 3909->3890 3917 7ff663c52e9d call 7ff663c7220c 3916->3917 3918 7ff663c52e88-7ff663c52e9b 3916->3918 3917->3898 3918->3917 3919 7ff663c52ec5-7ff663c52ecb call 7ff663c77904 3918->3919
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite$Handle
                                                                                    • String ID:
                                                                                    • API String ID: 4209713984-0
                                                                                    • Opcode ID: 95d7fd16c8d926fcf5da752308064adee905e679e75eda990adbc5c1a1c917ca
                                                                                    • Instruction ID: 079511bb0ba045a2b0c5d6275714d385035def757bd4199e566652062496cb67
                                                                                    • Opcode Fuzzy Hash: 95d7fd16c8d926fcf5da752308064adee905e679e75eda990adbc5c1a1c917ca
                                                                                    • Instruction Fuzzy Hash: 3251E132B19A42D2FA608B25D85677A63B0FF85BA4F440131FA4DAAB90DF7CE595C300

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$TextWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2912839123-0
                                                                                    • Opcode ID: 398714b8a983ed6cb119d18cda1b7bc47d2b30c0ee71a2e849910cbb5793c2eb
                                                                                    • Instruction ID: dec8318d337f51eb6492ba12d90beb1a8b2720ae60ca4a0a62ce86aa75d14046
                                                                                    • Opcode Fuzzy Hash: 398714b8a983ed6cb119d18cda1b7bc47d2b30c0ee71a2e849910cbb5793c2eb
                                                                                    • Instruction Fuzzy Hash: AB519FA2F14762C4FB009BA5D8462AD2332BF45BE4F400236EE1DAABD6DF6DE441C304

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 2359106489-0
                                                                                    • Opcode ID: 9d9d2995018f7f6f648ac6a5d97c5d37007cde808aee1d861722df7aa9659c46
                                                                                    • Instruction ID: fe3a6194a888947de5d47c3c87882f667bb38f8ce0a002311203ff6ab75b6d10
                                                                                    • Opcode Fuzzy Hash: 9d9d2995018f7f6f648ac6a5d97c5d37007cde808aee1d861722df7aa9659c46
                                                                                    • Instruction Fuzzy Hash: AA31A032E0C642C1EA609B25A9462796271FB887E0F540231FE8DEA7D5CF3CE5658700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                    • String ID:
                                                                                    • API String ID: 1452418845-0
                                                                                    • Opcode ID: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                    • Instruction ID: 94e4cd8113efd5144070e07f0e89a41c6365c4b9ae647d2b6b83f3184f87b1f7
                                                                                    • Opcode Fuzzy Hash: f380b52e8f95e6a0f24ce785192d8cb773bc143ddf3d62aee805abe4fb8ed354
                                                                                    • Instruction Fuzzy Hash: A6313721E1D243C2FA64AB6498237BA27B1AF45384F445434FE4EEF7D3DE2CB9448291
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$FileHandleRead
                                                                                    • String ID:
                                                                                    • API String ID: 2244327787-0
                                                                                    • Opcode ID: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                    • Instruction ID: f4c0b11f382e227e9833c7db40b1c6562214d1d7e93c0e83f0a73a2534cb35b5
                                                                                    • Opcode Fuzzy Hash: 5dece825d5be91adec6864fa12bb564f4e3b5809c08bfde6ef0babe01e3581d0
                                                                                    • Instruction Fuzzy Hash: E9219231A0C642C1EA605F11A41123967F8FF65BA4F144530FA5DEE784CF7CE8A58710
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C5ECD8: ResetEvent.KERNEL32 ref: 00007FF663C5ECF1
                                                                                      • Part of subcall function 00007FF663C5ECD8: ReleaseSemaphore.KERNEL32 ref: 00007FF663C5ED07
                                                                                    • ReleaseSemaphore.KERNEL32 ref: 00007FF663C5E974
                                                                                    • CloseHandle.KERNELBASE ref: 00007FF663C5E993
                                                                                    • DeleteCriticalSection.KERNEL32 ref: 00007FF663C5E9AA
                                                                                    • CloseHandle.KERNEL32 ref: 00007FF663C5E9B7
                                                                                      • Part of subcall function 00007FF663C5EA5C: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF663C5E95F,?,?,?,00007FF663C5463A,?,?,?), ref: 00007FF663C5EA63
                                                                                      • Part of subcall function 00007FF663C5EA5C: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF663C5E95F,?,?,?,00007FF663C5463A,?,?,?), ref: 00007FF663C5EA6E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                    • String ID:
                                                                                    • API String ID: 502429940-0
                                                                                    • Opcode ID: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                    • Instruction ID: b1273b325a2aaaa28029efda4888ff09e4f81e61d06023d9c328f8e12e29b288
                                                                                    • Opcode Fuzzy Hash: 7c4c69b688bb09167c3d8ec6f4195a818a409db0987586a56ae23aa503e7e0cd
                                                                                    • Instruction Fuzzy Hash: 08014032A18B91E2E658DB21E5856ADB731FB84BD0F005031EB5D67725CF39E5B4C740
                                                                                    APIs
                                                                                    • LoadBitmapW.USER32 ref: 00007FF663C6B02A
                                                                                    • GetObjectW.GDI32 ref: 00007FF663C6B05B
                                                                                      • Part of subcall function 00007FF663C68624: FindResourceW.KERNEL32 ref: 00007FF663C6863D
                                                                                      • Part of subcall function 00007FF663C68624: SizeofResource.KERNEL32 ref: 00007FF663C68659
                                                                                      • Part of subcall function 00007FF663C68624: LoadResource.KERNEL32 ref: 00007FF663C68673
                                                                                      • Part of subcall function 00007FF663C68624: LockResource.KERNEL32 ref: 00007FF663C68685
                                                                                      • Part of subcall function 00007FF663C68624: GlobalAlloc.KERNELBASE ref: 00007FF663C686A6
                                                                                      • Part of subcall function 00007FF663C68624: GlobalLock.KERNEL32 ref: 00007FF663C686BB
                                                                                      • Part of subcall function 00007FF663C68624: CreateStreamOnHGlobal.COMBASE ref: 00007FF663C686E8
                                                                                      • Part of subcall function 00007FF663C68624: GdipAlloc.GDIPLUS ref: 00007FF663C686FE
                                                                                      • Part of subcall function 00007FF663C68624: GdipCreateHBITMAPFromBitmap.GDIPLUS ref: 00007FF663C68769
                                                                                      • Part of subcall function 00007FF663C68624: GlobalUnlock.KERNEL32 ref: 00007FF663C6878C
                                                                                      • Part of subcall function 00007FF663C68624: GlobalFree.KERNEL32 ref: 00007FF663C68795
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Resource$AllocBitmapCreateGdipLoadLock$FindFreeFromObjectSizeofStreamUnlock
                                                                                    • String ID: ]
                                                                                    • API String ID: 2565863721-3352871620
                                                                                    • Opcode ID: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                    • Instruction ID: 6d04cb4f35d855d91ddee03ba86e91d1f149df5acacc81ef1669fe7ea66af635
                                                                                    • Opcode Fuzzy Hash: 2f79d63664e457f963bfbd157e1c525b341384e02eb8e860e1f42d2dee528bbf
                                                                                    • Instruction Fuzzy Hash: BA114661B0D742C2FA649B23A65677957B1EF8ABC4F080034F95D9FB96DE3DE8048740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$CreatePriority
                                                                                    • String ID: CreateThread failed
                                                                                    • API String ID: 2610526550-3849766595
                                                                                    • Opcode ID: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                    • Instruction ID: 7eb7e1b6c46463d8fcf5f61a7f8c3ad717f8cd27894e94910bc00aa1ac559939
                                                                                    • Opcode Fuzzy Hash: cf4f3858e1c5421656891f758a667cd72a6f2059ba57d4f8d940dbc9b5e0f540
                                                                                    • Instruction Fuzzy Hash: 84114C31A09B42D2EB15DF20E8422AA7770FB84B94F544131FA8DAA769EF3CE595C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryInitializeMallocSystem
                                                                                    • String ID: riched20.dll
                                                                                    • API String ID: 174490985-3360196438
                                                                                    • Opcode ID: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                                                    • Instruction ID: ff22e3ce0a755e6013e6abe8452c949ba930d5731897f12de8f418cd1a3745c7
                                                                                    • Opcode Fuzzy Hash: 0d85db053d286d1bd0fa19ead2840fc3f5149c6ee0f027e6ed6c33eb2c824e37
                                                                                    • Instruction Fuzzy Hash: 0DF04F71618A41C2EB009F60F41616AB7B0FF88754F401135FA8E9A754DF7CE199CB00
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C6853C: GlobalMemoryStatusEx.KERNEL32 ref: 00007FF663C6856C
                                                                                      • Part of subcall function 00007FF663C5AAE0: LoadStringW.USER32 ref: 00007FF663C5AB67
                                                                                      • Part of subcall function 00007FF663C5AAE0: LoadStringW.USER32 ref: 00007FF663C5AB80
                                                                                      • Part of subcall function 00007FF663C41FA0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C41FFB
                                                                                      • Part of subcall function 00007FF663C4129C: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF663C41396
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C701BB
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C701C1
                                                                                    • SendDlgItemMessageW.USER32 ref: 00007FF663C701F2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$LoadString$Concurrency::cancel_current_taskGlobalItemMemoryMessageSendStatus
                                                                                    • String ID:
                                                                                    • API String ID: 3106221260-0
                                                                                    • Opcode ID: 50943eb0d71ceff129c8121e8f01f0fadb5476574ce88c5faafc7aadbcf6f760
                                                                                    • Instruction ID: 97061586ed9c3e3539d12137fb2c094c893af138f456fed9d67c860bca2bce6b
                                                                                    • Opcode Fuzzy Hash: 50943eb0d71ceff129c8121e8f01f0fadb5476574ce88c5faafc7aadbcf6f760
                                                                                    • Instruction Fuzzy Hash: 9851BE62F05642CAFB109BA6D4562FD2372AB85B98F400235EE4DAB7DADE2CE510C340
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Concurrency::cancel_current_task__std_exception_copy_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 2371198981-0
                                                                                    • Opcode ID: a50b0030b050ded6b6f91e1f6aff0fbaa0ec1f604de9c547ba2e308d5291563c
                                                                                    • Instruction ID: 42e822800f960fddd29f790a06713c6f68527392766bc258a23884941b516565
                                                                                    • Opcode Fuzzy Hash: a50b0030b050ded6b6f91e1f6aff0fbaa0ec1f604de9c547ba2e308d5291563c
                                                                                    • Instruction Fuzzy Hash: B4411462B08645C5EA14DB16E646279A375EB04BE0F544231EEBC9FBD6DF3CE0A1C304
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 2272807158-0
                                                                                    • Opcode ID: 4ce248ffffd21e537046429b603db88a9fd2a3d13b10b45fb751dcef003d6319
                                                                                    • Instruction ID: f91a3484e2f188f8f05e8fb47d6260d7d012d65fa332612e707ab3f18f943646
                                                                                    • Opcode Fuzzy Hash: 4ce248ffffd21e537046429b603db88a9fd2a3d13b10b45fb751dcef003d6319
                                                                                    • Instruction Fuzzy Hash: 1341B372A08785C2EB248B15E45626A67B1FB847B4F105334EFAD5BBD5CF3DE4A18700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 2176759853-0
                                                                                    • Opcode ID: 324ad9725680782466c8b9226039195d64c3332d7d8035b24254b52cca95445d
                                                                                    • Instruction ID: dc5b6de69c929acea602f619ad0eb9e816600f5c865d60371dfb6b100fce672a
                                                                                    • Opcode Fuzzy Hash: 324ad9725680782466c8b9226039195d64c3332d7d8035b24254b52cca95445d
                                                                                    • Instruction Fuzzy Hash: F521B162A28B8581EA108B25B44217AA374FB89BD0F145231FFDD97B95CF3CE190C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::bad_alloc::bad_alloc
                                                                                    • String ID:
                                                                                    • API String ID: 1875163511-0
                                                                                    • Opcode ID: 0ac8b931c67533783bb99e44ed512301af0920adb1b65b15738df05c1e7b1342
                                                                                    • Instruction ID: b5949272c952ebd8598a77dd9703dba0cdf5834cf514b26061c8300857be65a5
                                                                                    • Opcode Fuzzy Hash: 0ac8b931c67533783bb99e44ed512301af0920adb1b65b15738df05c1e7b1342
                                                                                    • Instruction Fuzzy Hash: 7D31AF22A09A86D1FB249B15E4563B963B0FB41B84F544031F68CAEBA9DF7CE946C301
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 1203560049-0
                                                                                    • Opcode ID: 523e4a483c86c9ac9ee543cf6c476d9bf2e9d6353514affc3e0f4067b8c7bc61
                                                                                    • Instruction ID: fd9e7d5cdd088de66c482ed3e2b22bb02bcde9b14dac64fcd4e54c069b257890
                                                                                    • Opcode Fuzzy Hash: 523e4a483c86c9ac9ee543cf6c476d9bf2e9d6353514affc3e0f4067b8c7bc61
                                                                                    • Instruction Fuzzy Hash: 83218332A18B85C1EA209B25E85626A6371FF88BA4F505230FE9E9A795DF3CD551CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3118131910-0
                                                                                    • Opcode ID: 9e0f12d03b62ccef14e62e4bf3878a3457daa81ed2db8d115c48a0739d4b379d
                                                                                    • Instruction ID: 5d313119e16e6efa63312666d522d04e0f029773b25ba9f61e5c31f082a0b29b
                                                                                    • Opcode Fuzzy Hash: 9e0f12d03b62ccef14e62e4bf3878a3457daa81ed2db8d115c48a0739d4b379d
                                                                                    • Instruction Fuzzy Hash: 5A218632A18B81C1EA108B25E85626E7371FB84BA4F505230FE9DAABD5DF3CE551C700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 1203560049-0
                                                                                    • Opcode ID: d981565e32c06465bb9ca9e6032df0ff87469bcd01ee0110978b6e45bf249536
                                                                                    • Instruction ID: 45961a61e383d9d5285f5f67194ee8b0e91b3b81b1eebc17107f29a3d1bc19a9
                                                                                    • Opcode Fuzzy Hash: d981565e32c06465bb9ca9e6032df0ff87469bcd01ee0110978b6e45bf249536
                                                                                    • Instruction Fuzzy Hash: 98218332A18B81C1EA108B29F8462297371FBD8BA4F540231FA9D9BBE5DF3CE551C700
                                                                                    APIs
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C4F895
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C4F89B
                                                                                      • Part of subcall function 00007FF663C53EC8: FindClose.KERNELBASE(?,?,00000000,00007FF663C60811), ref: 00007FF663C53EFD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                                                                    • String ID:
                                                                                    • API String ID: 3587649625-0
                                                                                    • Opcode ID: 31de71ccb13629eb4e8ff473cf0e989b9a8a473b909947ada8621b483159802c
                                                                                    • Instruction ID: 2e4d2f415e03a56ddb4e23d49836c2cde342e9b468f3eb916acaf332dced0317
                                                                                    • Opcode Fuzzy Hash: 31de71ccb13629eb4e8ff473cf0e989b9a8a473b909947ada8621b483159802c
                                                                                    • Instruction Fuzzy Hash: BE917E73A18A81D4EB10DB24D4462AD63B1FB85798F504135FA5CABBEADF78E585C300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: 8a0d7ffcdee688d7cb22665fdd22367b6c642a36889c5767c2428ca75abdd5ff
                                                                                    • Instruction ID: 556436ade900084f3c9aa2fd1f686649f1ebe1e84d6ddb3d684ee7e81d6a8c77
                                                                                    • Opcode Fuzzy Hash: 8a0d7ffcdee688d7cb22665fdd22367b6c642a36889c5767c2428ca75abdd5ff
                                                                                    • Instruction Fuzzy Hash: 4B418062F14652C4FB00DAB5D8522BD2770AF85BA8F145135EE1DBBBDADE38E4928300
                                                                                    APIs
                                                                                    • SetFilePointer.KERNELBASE(00000000,00000002,?,00000F99,?,00007FF663C5274D), ref: 00007FF663C528A9
                                                                                    • GetLastError.KERNEL32(?,00007FF663C5274D), ref: 00007FF663C528B8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastPointer
                                                                                    • String ID:
                                                                                    • API String ID: 2976181284-0
                                                                                    • Opcode ID: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                    • Instruction ID: ccd21b082bb3105fb6306c46f49f4a0692b76fefd57504dffa3773fa4bea1cc5
                                                                                    • Opcode Fuzzy Hash: 043a82e8aff847b2e282b78885e55c7214a93c585b530bdf19c19deffc600893
                                                                                    • Instruction Fuzzy Hash: CB31A433B19A52C2EA604B6AD95267963F0EF14BE4F180131FE1DAFB90DE3CE5519740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 1746051919-0
                                                                                    • Opcode ID: 8763c555b957396376e96df864685bb2527d49eefc22d4d720e740779d29c564
                                                                                    • Instruction ID: acad66ccfe33040e3513c0ba8323513cda1495f98b21e432dbb8d1bd2cc92b3c
                                                                                    • Opcode Fuzzy Hash: 8763c555b957396376e96df864685bb2527d49eefc22d4d720e740779d29c564
                                                                                    • Instruction Fuzzy Hash: 9331B022A18746C2EA209B25F45637EB374EB84B90F444231FB9C9BB96EF3CF1418704
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$BuffersFlushTime
                                                                                    • String ID:
                                                                                    • API String ID: 1392018926-0
                                                                                    • Opcode ID: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                    • Instruction ID: 6600be2f34def7a5139cf1e6aaf0ba01f145e7710135faa12ebf4c8ae8b04d4b
                                                                                    • Opcode Fuzzy Hash: 1f7bfd0f82637a6abdcd08aef8b442a865f6f50d97ba3a1fa7ef62b0e093425a
                                                                                    • Instruction Fuzzy Hash: 2221E232F09B42D1EA628E51D4627BA67F0AF017A4F144131EE4E9A391EE3CD5A6C300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: LoadString
                                                                                    • String ID:
                                                                                    • API String ID: 2948472770-0
                                                                                    • Opcode ID: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                    • Instruction ID: d3f5605982d871b80724043c7067962742e704ea82235fb24fa5bb7450b56612
                                                                                    • Opcode Fuzzy Hash: efc1550bd5bba1d5ac9face2304fa075ed5e4cb94ffc19493764f318ca00d951
                                                                                    • Instruction Fuzzy Hash: 26116D75B08651C6EB048F1AA84216977B1BB88FD0F544535EE0DFB721DF7CE5518384
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastPointer
                                                                                    • String ID:
                                                                                    • API String ID: 2976181284-0
                                                                                    • Opcode ID: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                    • Instruction ID: 342859d0dfa15471f778f695d3e0afb2336676498c33050df5758a1c9d13c53c
                                                                                    • Opcode Fuzzy Hash: 5eda2cbf1ce6837a88d649c872729f31e823bc49095d59e5e9b193bf7b9166cd
                                                                                    • Instruction Fuzzy Hash: E8116031A08641C1FB608B25E84226976B0FB54BB4F544331EA6DAA7D6CF3DE596C300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemRectTextWindow$Clientswprintf
                                                                                    • String ID:
                                                                                    • API String ID: 3322643685-0
                                                                                    • Opcode ID: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                    • Instruction ID: 3a4ca9e49a8d5e1c4aa9c690832782307b88c4d8b3ed94c5af598dc547586a57
                                                                                    • Opcode Fuzzy Hash: ad94589889145b650e3461eb84003e845283bd92425fc2a9221c8100a4e27e71
                                                                                    • Instruction Fuzzy Hash: FF012520A1D34AC2FF556762A4672B957725F85744F085035F84DEE3DADE6CF485C300
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF663C5EBAD,?,?,?,?,00007FF663C55752,?,?,?,00007FF663C556DE), ref: 00007FF663C5EB5C
                                                                                    • GetProcessAffinityMask.KERNEL32 ref: 00007FF663C5EB6F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$AffinityCurrentMask
                                                                                    • String ID:
                                                                                    • API String ID: 1231390398-0
                                                                                    • Opcode ID: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                    • Instruction ID: 0867a33a245b8bee1d1b39502b737179b605e2c1258257f585eab924ff6be7b4
                                                                                    • Opcode Fuzzy Hash: 444071b75e142e51b736d9fa504759652bc9944b894df1f8101a797a07211085
                                                                                    • Instruction Fuzzy Hash: CDE0E561B1864682DB098B65C4428E973B2BF88B40B849035E60BD7B14DE3CE2458B00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                                                    • String ID:
                                                                                    • API String ID: 1173176844-0
                                                                                    • Opcode ID: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                                                                                    • Instruction ID: aece2cb03b7e94919a0dace6b61a4e0ea63d1b69bd78c0c0ab0d4ba2e9581b0a
                                                                                    • Opcode Fuzzy Hash: ac554a43d54612151bc7e480101717375080be3004ee5b366f50feb51e7139dd
                                                                                    • Instruction Fuzzy Hash: 1FE0BD40E0A20BC2FA2862A618371B400705F69371E581B30FE7EAC7D3EE1DF8A28150
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 485612231-0
                                                                                    • Opcode ID: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                    • Instruction ID: d63d726bef097ed84574e94e081ca1d764253b79d2ec9197cf3a20c00fd7c62e
                                                                                    • Opcode Fuzzy Hash: 7829e02dcbd74b51c5e196648e5aad52518f68633834b7095f7e5950a32ae739
                                                                                    • Instruction Fuzzy Hash: 74E08C60E09203C2FF28ABB2980B1B916F05F94B92F040034ED0DEE352EE3CB5818600
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: db0f75601c8d953953658c1d14be6529ec917dbd1ad2d5887d518296e9f1c024
                                                                                    • Instruction ID: 92b6534b29654c1e006cd15d4c69900e7b9358806e518c90d2eea66ddafb7c3a
                                                                                    • Opcode Fuzzy Hash: db0f75601c8d953953658c1d14be6529ec917dbd1ad2d5887d518296e9f1c024
                                                                                    • Instruction Fuzzy Hash: 90D1C972B08682D6EB689B259A452BD67B1FB95B84F040035EF5D9B7A2CF3CE4708700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 1017591355-0
                                                                                    • Opcode ID: fa91c3799828e3c7186940546e344b2356dc381c1e63a9425ea543ecc2eeea66
                                                                                    • Instruction ID: 0e272b35e637598087450e1fc24632453c6c8ee4435bccbf00139ff3e40b2037
                                                                                    • Opcode Fuzzy Hash: fa91c3799828e3c7186940546e344b2356dc381c1e63a9425ea543ecc2eeea66
                                                                                    • Instruction Fuzzy Hash: A261DF71E0C647C1FA649A2A841727A52B1AF95BF5F144131FE4FEEBC5EE6CE4618300
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C5E948: ReleaseSemaphore.KERNEL32 ref: 00007FF663C5E974
                                                                                      • Part of subcall function 00007FF663C5E948: CloseHandle.KERNELBASE ref: 00007FF663C5E993
                                                                                      • Part of subcall function 00007FF663C5E948: DeleteCriticalSection.KERNEL32 ref: 00007FF663C5E9AA
                                                                                      • Part of subcall function 00007FF663C5E948: CloseHandle.KERNEL32 ref: 00007FF663C5E9B7
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C61ACB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle$CriticalDeleteReleaseSectionSemaphore_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 904680172-0
                                                                                    • Opcode ID: f81b05313dfd5b5a73717daa6d384c08c9459244a7d30a6ec5ae517113eafb45
                                                                                    • Instruction ID: edd696b679e8e85d70013219286cc6b7c670865d8255b141e61176245c775b80
                                                                                    • Opcode Fuzzy Hash: f81b05313dfd5b5a73717daa6d384c08c9459244a7d30a6ec5ae517113eafb45
                                                                                    • Instruction Fuzzy Hash: 2C617062B15685D2EE08DB6AD5560BC7375FB41F90B544232FB2D9BBD2CF28E4718300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: d7b1a399856acf99fdb305a598bd345408e38bb8b7611d952776f17d246575aa
                                                                                    • Instruction ID: ec5c3eb65a975ccd2d6722dfaceec28270b99e5fb1a90056eefce3923ffcd8ef
                                                                                    • Opcode Fuzzy Hash: d7b1a399856acf99fdb305a598bd345408e38bb8b7611d952776f17d246575aa
                                                                                    • Instruction Fuzzy Hash: CA51CF62A08A82C0EA14DB25E4463B96771FB85BD4F581132FF4DAB397CE3DE495C300
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C53EC8: FindClose.KERNELBASE(?,?,00000000,00007FF663C60811), ref: 00007FF663C53EFD
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C4E993
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 1011579015-0
                                                                                    • Opcode ID: e982e273b1865209a75a3cfd535ad9023e3388265a11ab7418cbf5dec2d39955
                                                                                    • Instruction ID: 1b796883dd2a57ae2325f89730f53a63b1fa78442d77173d973576ab39dd85ba
                                                                                    • Opcode Fuzzy Hash: e982e273b1865209a75a3cfd535ad9023e3388265a11ab7418cbf5dec2d39955
                                                                                    • Instruction Fuzzy Hash: DF516F22A08786C2FE60DF28D4463AD6371FB94B94F451136FA8DAB7A6CF2CE441C350
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: cab7305fc7f02fa62d82a2074b03de0e890be2f3ad12253e4411164f42ee387c
                                                                                    • Instruction ID: bb34c52e788322107a950653fdd392ee3cbcc6a116254639e56f5821dfbb9124
                                                                                    • Opcode Fuzzy Hash: cab7305fc7f02fa62d82a2074b03de0e890be2f3ad12253e4411164f42ee387c
                                                                                    • Instruction Fuzzy Hash: 1741E672B18B8182EE148E16AA06379A271FB44BD0F448535FE4D9BF5ADF3CE4A18300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: c12ddbc590a903591de313708f19a8cb728d3d3f41945339a7b2dbf0642da7e2
                                                                                    • Instruction ID: 348ee2f8eeaf7e3f165be109dea36f37f9e40bcc7eac0277e19b2cc04ad0cf1e
                                                                                    • Opcode Fuzzy Hash: c12ddbc590a903591de313708f19a8cb728d3d3f41945339a7b2dbf0642da7e2
                                                                                    • Instruction Fuzzy Hash: B341E673A08B06C1EF149B29E94637963B1EB84BE8F141135FA8D9B799DF3DE4608700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                                                                                    • String ID:
                                                                                    • API String ID: 680105476-0
                                                                                    • Opcode ID: 81bbc9496a7d415ea2bbbc601fb53a43020ae880daa92f7a292fdc8bc8c92929
                                                                                    • Instruction ID: ef22f7d8836c1201a5c3027bba23f52e35126921d91dd67a37761a88c064ac29
                                                                                    • Opcode Fuzzy Hash: 81bbc9496a7d415ea2bbbc601fb53a43020ae880daa92f7a292fdc8bc8c92929
                                                                                    • Instruction Fuzzy Hash: 58216522A09751C5EA149F56A5022796270FB05BF0F580731EEBD9FBD2EE7CE4618344
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: 31b34ebacb9280de439ed9c8253ac234116577bf367a3ee86a8e065c3418b0aa
                                                                                    • Instruction ID: b06552946999bea08f2d5630c79d758a875bbb6d1137c4003c5f09bfbd750062
                                                                                    • Opcode Fuzzy Hash: 31b34ebacb9280de439ed9c8253ac234116577bf367a3ee86a8e065c3418b0aa
                                                                                    • Instruction Fuzzy Hash: 09214922B14686A2EA08EB20D5663F86335FB84784F944431FB1D9B7A3CF3DE5A5C300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                    • String ID:
                                                                                    • API String ID: 3215553584-0
                                                                                    • Opcode ID: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                    • Instruction ID: 3007ea22d1739096d59df8673b37d50cacf744686acc5149fd9d0591461a0ec5
                                                                                    • Opcode Fuzzy Hash: 9dd5a9e84c18447e56e2265fa04046f11d37b96b7f5b774ce3305aa6458b3f00
                                                                                    • Instruction Fuzzy Hash: 95114632A1C682D6F6509B58A4826796AF4FB40380F550535FAAEEF796DF3CFA108700
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C6F0A4: GetDlgItem.USER32 ref: 00007FF663C6F0E3
                                                                                      • Part of subcall function 00007FF663C6F0A4: ShowWindow.USER32 ref: 00007FF663C6F109
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F11E
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F136
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F157
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F173
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F1B6
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F1D4
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F1E8
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F212
                                                                                      • Part of subcall function 00007FF663C6F0A4: SendMessageW.USER32 ref: 00007FF663C6F22A
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C6FD03
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$ItemShowWindow_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 1587882848-0
                                                                                    • Opcode ID: fa0b25d607c2a3d7c3132c1b972b51ca43b41eaf5a0b6b23d19ec92ece6d4f9e
                                                                                    • Instruction ID: 3c4024169aaf622ad7fad136c7780369d3378f19acdd40fdf0219d98cf7d44d2
                                                                                    • Opcode Fuzzy Hash: fa0b25d607c2a3d7c3132c1b972b51ca43b41eaf5a0b6b23d19ec92ece6d4f9e
                                                                                    • Instruction Fuzzy Hash: 9401C4A2A2968986E9209B25D44737E6371EF8A794F501331FA9C9EBD6DE2CF0408604
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: dd833eb704b03c62a36fea145c0b0b4abee32047d89ef2e694e61e0216d7ee09
                                                                                    • Instruction ID: 6c8d7d700dc26acb7846684497da636768a1a3c56d31bb9d9434d3c4a927313d
                                                                                    • Opcode Fuzzy Hash: dd833eb704b03c62a36fea145c0b0b4abee32047d89ef2e694e61e0216d7ee09
                                                                                    • Instruction Fuzzy Hash: 5001C462E18785C1EA119728E8462297371FBC97A4F405231FA9C5BBA6DF2CE0418704
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C71604: GetModuleHandleW.KERNEL32(?,?,?,00007FF663C71573,?,?,?,00007FF663C7192A), ref: 00007FF663C7162B
                                                                                    • DloadProtectSection.DELAYIMP ref: 00007FF663C715C9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: DloadHandleModuleProtectSection
                                                                                    • String ID:
                                                                                    • API String ID: 2883838935-0
                                                                                    • Opcode ID: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                                                                    • Instruction ID: bbaed5f4ce48fb08935afd968b10b1c11ff868d3e70ca0b070ee18b1836f2f19
                                                                                    • Opcode Fuzzy Hash: 902d746097657f35995c40355b3f554eba39218e3fb79a70aefbb70b68ceb6fd
                                                                                    • Instruction Fuzzy Hash: D3118A60D09647C7FBA8BB19A863B702BB1AF54348F140435FD0DEE3A1EE3CB5959600
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C540BC: FindFirstFileW.KERNELBASE ref: 00007FF663C5410B
                                                                                      • Part of subcall function 00007FF663C540BC: FindFirstFileW.KERNELBASE ref: 00007FF663C5415E
                                                                                      • Part of subcall function 00007FF663C540BC: GetLastError.KERNEL32 ref: 00007FF663C541AF
                                                                                    • FindClose.KERNELBASE(?,?,00000000,00007FF663C60811), ref: 00007FF663C53EFD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$FileFirst$CloseErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1464966427-0
                                                                                    • Opcode ID: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                    • Instruction ID: 8189e6d0526242de498f46c8bdf4ccc5ddf4625f944626362ebea6b725649335
                                                                                    • Opcode Fuzzy Hash: 18fe74ab7ca813274cb64c08179860cc48efc587ad39327f0b25563dc18ddab5
                                                                                    • Instruction Fuzzy Hash: 1BF0AF72908281C5EA109BB5A90227D37709B1ABB4F285378FA3D9B3C7CE28D4A58744
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileType
                                                                                    • String ID:
                                                                                    • API String ID: 3081899298-0
                                                                                    • Opcode ID: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                    • Instruction ID: 27202881d140f35fe1c1d35f4c31ad8302656edae15bc984dad94306fcf957bc
                                                                                    • Opcode Fuzzy Hash: df9a28314c6b6fddfb177ebf539387614dcb0363737e1ba4f38fe55c4f903e1a
                                                                                    • Instruction Fuzzy Hash: 8ED0C922909541D2DD109635986203C22B0AF92736FA40720E63EE57E1CF2D95A6A311
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentDirectory
                                                                                    • String ID:
                                                                                    • API String ID: 1611563598-0
                                                                                    • Opcode ID: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                    • Instruction ID: a7f636b674f2431112691d7a91eb4913ae21b0135fb34857540b612e2e28a57c
                                                                                    • Opcode Fuzzy Hash: 176ab68ebee512dad0278907058cd855c5c44f8615b79807412a7d406b36e525
                                                                                    • Instruction Fuzzy Hash: 78C08C20F05602C1DA089B26CCCA81813B4BB40B04B608034E10CD5260CE3CC5FAA345
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocHeap
                                                                                    • String ID:
                                                                                    • API String ID: 4292702814-0
                                                                                    • Opcode ID: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                    • Instruction ID: 087e6aaedc7a51bbbbe8a1ac7294244ad58fe0485345ec6ebe08652127f55d10
                                                                                    • Opcode Fuzzy Hash: c4d23aaef5024e3722ccbb242168b3e22d65bf63548bcaacbbf61b8d0a3ba7a1
                                                                                    • Instruction Fuzzy Hash: E8F0F955B09207C9FE546A6599972B916F09F95FA0F485430ED0EEE782ED2CB6814220
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocHeap
                                                                                    • String ID:
                                                                                    • API String ID: 4292702814-0
                                                                                    • Opcode ID: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                    • Instruction ID: cfdfe3725061bc8784a3731e7e65bd39a10eb957c2aea20503278c061309aec6
                                                                                    • Opcode Fuzzy Hash: 5fa632deebd8181b9f3ea37834cf4eccbda839d7d0d6f948310c23224b4a93e7
                                                                                    • Instruction Fuzzy Hash: D6F01C51F09247C5FF6467B1585B6B51AB05F847A0F085A30FD6EEE7C2DE2CF4818610
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                    • Instruction ID: 7d6745f3a3c21524c9d64f29c701995e832d1cd30edc7d90b460e3f21a5ff297
                                                                                    • Opcode Fuzzy Hash: ccbd9008d2c4ce7168f8d058ff2f34620ae6bf54bfe45a0cbca9d6a6f1a7c065
                                                                                    • Instruction Fuzzy Hash: 16F0A432A08682D6FB248B30E05237A66B0EB14B78F484334F73C892D4CF28D8A59300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$CloseErrorFileHandleLastwcscpy$ControlCreateCurrentDeleteDeviceDirectoryProcessRemove
                                                                                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                    • API String ID: 2659423929-3508440684
                                                                                    • Opcode ID: 133043678a36d966ba880c912d6856c5696a7c6c433e50d223eb52f27bd95b56
                                                                                    • Instruction ID: 88a27eeac08d4850d3962f4e25af974d95c60c4823973a2395fcc82270096134
                                                                                    • Opcode Fuzzy Hash: 133043678a36d966ba880c912d6856c5696a7c6c433e50d223eb52f27bd95b56
                                                                                    • Instruction Fuzzy Hash: E6627E62F18742D5FB109B74D4462BD2771EB857A4F508231EA6DABBEADF38E185C300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                                                                    • String ID: %ls$%s: %s
                                                                                    • API String ID: 2539828978-2259941744
                                                                                    • Opcode ID: 21568db1dfba7bc17a929e43de596192cc6caa6a0b887fe5390b464c99ea9649
                                                                                    • Instruction ID: b8e56137dc61c53fccf40202e1aeed4aa00bdc5df779bc847424c466096f9267
                                                                                    • Opcode Fuzzy Hash: 21568db1dfba7bc17a929e43de596192cc6caa6a0b887fe5390b464c99ea9649
                                                                                    • Instruction Fuzzy Hash: A1B2BC72A1D682C2EA249726E4561BE6371FFC6790F104336F69DAB7D6DE6CE140C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfomemcpy_s
                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                    • API String ID: 1759834784-2761157908
                                                                                    • Opcode ID: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                    • Instruction ID: 55ec678ddec31f8426ab298dfe3a38a3107834a7bc6aa8e4707e1007ed5b4602
                                                                                    • Opcode Fuzzy Hash: c1568b5568d689d261f1f0b975b9c1104ab10acfc5286cd5346a40821ab4f9bc
                                                                                    • Instruction Fuzzy Hash: 1EB20976A08192DBE7258E69D8557FD3BB1FB44788F505135EA0ABBB84DF38E604CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: NamePath$File_invalid_parameter_noinfo_noreturn$LongMoveShort$CompareCreateString
                                                                                    • String ID: rtmp
                                                                                    • API String ID: 3587137053-870060881
                                                                                    • Opcode ID: 3dcc5890c2e22e4a5feb2ae31f1f4ae3f3b67a4ee4a7a529d594af89e49fc87b
                                                                                    • Instruction ID: 5fba71ae5abc472a32a914b76b7e8985c77736dbcc8323175bc7b299ab7ef989
                                                                                    • Opcode Fuzzy Hash: 3dcc5890c2e22e4a5feb2ae31f1f4ae3f3b67a4ee4a7a529d594af89e49fc87b
                                                                                    • Instruction Fuzzy Hash: 70F1B232A08B42D1EE10DF69D8461BD67B1EB85794F500131FA4DABBAADF3CE594C740
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 1693479884-0
                                                                                    • Opcode ID: 35b10314ce3b8e4c64707b679fc70269f3b9094245ec8e91ba41ccecbc270bb7
                                                                                    • Instruction ID: 13492ac9fd5f25f6e3f9bcfdecba4a304fa4b68c13c3b9bdebf5c16c123b436a
                                                                                    • Opcode Fuzzy Hash: 35b10314ce3b8e4c64707b679fc70269f3b9094245ec8e91ba41ccecbc270bb7
                                                                                    • Instruction Fuzzy Hash: D2A19F72F15A52C5FF108BB998465BC2371AB49BB4F144231EE2EABBD9DE7CE0518304
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 3140674995-0
                                                                                    • Opcode ID: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                    • Instruction ID: b1183a41846dde7867167a6af6cbee8f6343d2c649f5f6e068c8fc17231a3260
                                                                                    • Opcode Fuzzy Hash: eb4060bcbbf6947450414bc0ac192b8da1feec02df413969c5a674799d26ef14
                                                                                    • Instruction Fuzzy Hash: 30314C72608B81DAEB608F60E8517EE7770FB84744F44443AEA4D9BB99DF38E648C710
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 1239891234-0
                                                                                    • Opcode ID: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                    • Instruction ID: 2171bd2646c094400bc21daff720b62fa6c2c6609e9c9d7334e69368a349ed13
                                                                                    • Opcode Fuzzy Hash: 5940ef1d6d2c32beaf7af9e8e0892e721e3d30544378453b8f42f9f5775f8da8
                                                                                    • Instruction Fuzzy Hash: 35315B32608B81D6EB608F25E8416AE77B4FB88B54F540135EE8D9BB99DF38D545CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3668304517-0
                                                                                    • Opcode ID: 0ba95719d321a735ef2b7b1a6a31fdddb52efdcad4a1d4ff3b8078863e84414b
                                                                                    • Instruction ID: a2bab026d1118274a495c30c9c53cda5e26af6601772e48f1c7fe6f66ef3539a
                                                                                    • Opcode Fuzzy Hash: 0ba95719d321a735ef2b7b1a6a31fdddb52efdcad4a1d4ff3b8078863e84414b
                                                                                    • Instruction Fuzzy Hash: B3B1AF62B15786C6EB109B69D8462AD2371FB857D4F405231FE8DABB9AEF3CE550C300
                                                                                    APIs
                                                                                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF663C7FAC4
                                                                                      • Part of subcall function 00007FF663C77934: GetCurrentProcess.KERNEL32(00007FF663C80CCD), ref: 00007FF663C77961
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                                    • String ID: *?$.
                                                                                    • API String ID: 2518042432-3972193922
                                                                                    • Opcode ID: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                    • Instruction ID: 7f2455f2066b9d5e1a23347b432c2b50476ed2fca09d20d8d3b34de81da559bd
                                                                                    • Opcode Fuzzy Hash: f96344909874f118cd7fc652812aee2de17a0b901a5c412331694f6fbd6e8fc4
                                                                                    • Instruction Fuzzy Hash: AE51D462B15A95C9EB10DFA298564B977F4FF48BD8B444531EE1D6BB85DF3CE0428300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy_s
                                                                                    • String ID:
                                                                                    • API String ID: 1502251526-0
                                                                                    • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                    • Instruction ID: 401ab0603a3dace1a58be2304905d71571b02eacda919d91ebc19b1f1651a016
                                                                                    • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                                                                    • Instruction Fuzzy Hash: CCD1B432B19286D7DB24CF15A19966ABBB1F798744F148134EB4EA7B44DF3CE941CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFormatFreeLastLocalMessage
                                                                                    • String ID:
                                                                                    • API String ID: 1365068426-0
                                                                                    • Opcode ID: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                    • Instruction ID: 2415a0a905fccd71ab6efe82103a39fcc0abdcebad66335b32b17ae2b027d404
                                                                                    • Opcode Fuzzy Hash: c27e05edbcf0c556cf9f4b9f4aa6354f64d9dc72ff0f252d3a2ededa039666af
                                                                                    • Instruction Fuzzy Hash: 7D01FB7560CB42D2E7109F62B99157AA7B5FB89BC0F484034FA8E9BB49CF3CE5059B40
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .
                                                                                    • API String ID: 0-248832578
                                                                                    • Opcode ID: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                    • Instruction ID: e9c980e7aecf7ab9efb6b93e8b17ebf2eb660048dfba7f52a28bd51e768ed0ae
                                                                                    • Opcode Fuzzy Hash: 7c9d8364e7b62915daf92aecf888b4814fe01b6aae5fc02ec6e7aa2f3019df5b
                                                                                    • Instruction Fuzzy Hash: 2131EA22B1869589F7209A3698467B97AF1AB95BE4F148235FE5C9BBC5CE3CE5018300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise_clrfp
                                                                                    • String ID:
                                                                                    • API String ID: 15204871-0
                                                                                    • Opcode ID: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                    • Instruction ID: 4b84b7898dd05ce57df7b872c955a7ffe03840fdf13d3585517311a34018cbfa
                                                                                    • Opcode Fuzzy Hash: 131550a8e914c8a4384a7255cc8ec53066b4dff0b7ecc1394be8dfb6b4310eca
                                                                                    • Instruction Fuzzy Hash: 5EB14A73604B89CBEB15CF29C8463683BB0F744B58F158922EA5E9B7A8CF79D551CB00
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FormatInfoLocaleNumber
                                                                                    • String ID:
                                                                                    • API String ID: 2169056816-0
                                                                                    • Opcode ID: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                    • Instruction ID: 089ba4fb6ceb74fc1ee0481bdfd9fa63e80bfe30e97b70fc66aab7326fe9db83
                                                                                    • Opcode Fuzzy Hash: a0c8fcaef59427837b2a7c7753e3d717a8442860a15e47712294eddcbb527c28
                                                                                    • Instruction Fuzzy Hash: 6F114A22A08B85E6E6618F51E4117AA7370FF88B88F844135EA4D9B758DF3CE245C744
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C524C0: CreateFileW.KERNELBASE ref: 00007FF663C5259B
                                                                                      • Part of subcall function 00007FF663C524C0: GetLastError.KERNEL32 ref: 00007FF663C525AE
                                                                                      • Part of subcall function 00007FF663C524C0: CreateFileW.KERNEL32 ref: 00007FF663C5260E
                                                                                      • Part of subcall function 00007FF663C524C0: GetLastError.KERNEL32 ref: 00007FF663C52617
                                                                                    • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF663C515D0
                                                                                      • Part of subcall function 00007FF663C53980: MoveFileW.KERNEL32 ref: 00007FF663C539BD
                                                                                      • Part of subcall function 00007FF663C53980: MoveFileW.KERNEL32 ref: 00007FF663C53A34
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CreateErrorLastMove$_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 34527147-0
                                                                                    • Opcode ID: a3f7aeee67f5c6efee88f6f2c4f2f574ca9db3d7719bf1359f9a84a60e1a1e68
                                                                                    • Instruction ID: 22f0f55972961c2e9e8b4cb053bd50f880dfc2b7e2ab787c069bff58d275dde1
                                                                                    • Opcode Fuzzy Hash: a3f7aeee67f5c6efee88f6f2c4f2f574ca9db3d7719bf1359f9a84a60e1a1e68
                                                                                    • Instruction Fuzzy Hash: 4891AC32B18A46C2EE10DF6AD45A2A96371FB54BD4F401032FE4DABB96DE38E565C340
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectRelease$CapsDevice
                                                                                    • String ID:
                                                                                    • API String ID: 1061551593-0
                                                                                    • Opcode ID: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                    • Instruction ID: a4a9f6c8e8e92aa334e411a0b8f7ae8f1979897e89bfa6c5e61e0efac705984f
                                                                                    • Opcode Fuzzy Hash: 68dbe16693602acb82a0a9c061fd0d735b77194d41f4ab9e90264308bb487059
                                                                                    • Instruction Fuzzy Hash: C3811976B18B05C6EB20DF6AD441AAD7771FB89B88F004122EE0DABB64DF39D545C780
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Version
                                                                                    • String ID:
                                                                                    • API String ID: 1889659487-0
                                                                                    • Opcode ID: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                                                                                    • Instruction ID: 0b8d62507626f08b33df646a83e0158b80a0ce8e25f89b0f3ed6b07a5e209726
                                                                                    • Opcode Fuzzy Hash: 6220f8f0736b52f52a4f9f0684f7fcd1da0b773ba531a70ae5974f71c0de4052
                                                                                    • Instruction Fuzzy Hash: C001D3B1A0C642CBE6648B10E85277A33B1FB98754F900234E65EAA7A4DF3CF5158B00
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                    • String ID: 0
                                                                                    • API String ID: 3215553584-4108050209
                                                                                    • Opcode ID: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                    • Instruction ID: 5fec24d9435b978680b478fca2a33877a3e53becb662c530f20d0742b88438ff
                                                                                    • Opcode Fuzzy Hash: 0fbd957179d89af9e1d3453d65279f22830f04fe064c784c04e338e6c7bf3646
                                                                                    • Instruction Fuzzy Hash: 7581C126A18343C6EAA88A258443E7D22B0EF65B44F541931FF09EFB95CF2DF846C741
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                    • String ID: 0
                                                                                    • API String ID: 3215553584-4108050209
                                                                                    • Opcode ID: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                    • Instruction ID: 9b93a65729fe5dd372af7d26e6e080c99a9de3b7bdff661f7c57904061b16b74
                                                                                    • Opcode Fuzzy Hash: a261a21fa45f21d734edfefcd2ffe271b1157111beaf653bc061adca1a26389c
                                                                                    • Instruction Fuzzy Hash: 2171D321A0C382C6EB688A294447A7D27B0AF41B54F145531FF09FF7D6CE2DF8468741
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: gj
                                                                                    • API String ID: 0-4203073231
                                                                                    • Opcode ID: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                    • Instruction ID: f8e8b2b253f9d01fb17b61a297eed451dd0b9bcf01f0b3a64d18a7b05f7aa4a9
                                                                                    • Opcode Fuzzy Hash: 226aa63bfce789330e15763d8953fb7d553c3450d9c1aa6f260de1088bdface5
                                                                                    • Instruction Fuzzy Hash: F851AF37A286908BD724CF25E401A9A73B5F388758F049126FF4A93B09CB39E945CF40
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @
                                                                                    • API String ID: 0-2766056989
                                                                                    • Opcode ID: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                    • Instruction ID: 5ddc250bb121efd66cdf46295104cd6198f3f0ef769c500674bbbacce377c6d9
                                                                                    • Opcode Fuzzy Hash: 49e7fa989fc271adaa8e130b28d1cae0d9f82f392019a5f874cdac11a507a941
                                                                                    • Instruction Fuzzy Hash: 7F41BF23714A59CAEA48CF2AE4552A973B5E758FD4B499036EE0DAB794DE3CE041C300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 54951025-0
                                                                                    • Opcode ID: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                    • Instruction ID: c5073a4358c51bea1463963538a866d3b4fbf88b0904d22411e2e69f6969f9f1
                                                                                    • Opcode Fuzzy Hash: 4ce929ddb23f73c0a8458b43b9ad49d4d7e2a2f746430c3d48bba7e89996d797
                                                                                    • Instruction Fuzzy Hash: 3FB09220E17B06C2EA082B516C8325422B4BF48701F948038E20CEA720DE3D21A54710
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                    • Instruction ID: 7a9ba7b107f1269a82839b913ad65337bd2a51b6f53fe3f8f2d48079680cf22a
                                                                                    • Opcode Fuzzy Hash: 1df1e6e81a57214c8643d36be1bb9cde3812740f73d4ab830297bee2ffae98a2
                                                                                    • Instruction Fuzzy Hash: CA8214B3A096C1C6D705CF6AD8152BC3BB1E756B88F19813AEA4E9B396DE3CD445C310
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                    • Instruction ID: f1f251f13d71d3da97cd4f7a5c4df9f21e842e26804be6d2faefe14f229abbba
                                                                                    • Opcode Fuzzy Hash: fb6bb4a62616f0bcd3e2e2126cd32946fe2ad160a7c0dbd4e5bd03ed1428d6a6
                                                                                    • Instruction Fuzzy Hash: 5B627F9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                    • Instruction ID: d418b2774b14ed1d702a571aad15d9795bc92dc61a150dbe3fb4481e26eaa7eb
                                                                                    • Opcode Fuzzy Hash: 83a45c88a368d7276059de07aefbbc35b61cea5d64746511b72f3674958eea04
                                                                                    • Instruction Fuzzy Hash: 968200B3A096C18AD724CF2AD4056FC7BB1E756B48F288136DA4E9B78ACE3DD445C710
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                    • Instruction ID: 4a0edb87823b3c2a6d2a4fde0760a37981d6546a3fdd1cff26f481afe3cc04b6
                                                                                    • Opcode Fuzzy Hash: ffdf8f5a64276e3eb417e3b9ae5b43350349d41efb04db03fca9f8ba9e24336f
                                                                                    • Instruction Fuzzy Hash: 8A22E373B246508BD728CF25C89AE5E3766F798744B4B8228DF0ACB785DB39D505CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                    • Instruction ID: 3a25d8e0817ecdeb1922ae7525b5a8ab35446ca4de04c4481711ed9a86d11332
                                                                                    • Opcode Fuzzy Hash: 21143e83615dcc23e36b64f0d60848ac948cba63854c17a605a1a3ec217f9251
                                                                                    • Instruction Fuzzy Hash: EE32D072A08591CBE718CF25D551ABC37B1F795B48F118139EA4AABB89DF3CE860C740
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                    • Instruction ID: f3156bd53d6ae29acbe9261aade8dd1995df91d41a21682377e6052d0cb6c020
                                                                                    • Opcode Fuzzy Hash: 063370d9e2e9571dc593e8358d008e0ec5385ad0435e9f2f5019d46da215c13b
                                                                                    • Instruction Fuzzy Hash: 54C18CB7B281908FE350CF7AD400AAD3BB1F39878CB519125EF59A7B09D639E645CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                    • Instruction ID: 31e9494072eb08fccfbc32bfc3b35ace536ef66e77e68b0bf590430220578cea
                                                                                    • Opcode Fuzzy Hash: 602477e063b5c1ca901f2159ae3c7fc010244aaa433e93e1960e83d539d05e76
                                                                                    • Instruction Fuzzy Hash: B8A13873A08182C6EB15CA26D8567FD27B5EBA6744F454535FA8DAF786CE3CE841C300
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                    • Instruction ID: 7da276d6fc98a662da3adac599b00c8799de42fe29151862e05b7905466e4f4d
                                                                                    • Opcode Fuzzy Hash: e3f156a61251d3696a660eff3e2c5499dd818c979554cbf7ea7c30eccab92618
                                                                                    • Instruction Fuzzy Hash: 7CC11777A291E08DE302CBB5A4248FD3FF1E71E30DB4A4151EFA666B4AD5285201DF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID:
                                                                                    • API String ID: 190572456-0
                                                                                    • Opcode ID: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                    • Instruction ID: 779bde60809a83dd3faf0abea4c739e202f79885b5b15cf0e2264bf73cca6613
                                                                                    • Opcode Fuzzy Hash: ba0d91b71a6ba36ace61fab0c0f7d4922daa1e3f8d028e3e8b3457ff5b2a4fa0
                                                                                    • Instruction Fuzzy Hash: DF91FD62B1858196EB11DF29D8526FD6731FBA5788F441031FF4EAB74AEE38E646C300
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                    • Instruction ID: b3458f86ed6a78ee58b1503802fe7ff6de489376cb18efcd2bbd98ddb1b3d9ae
                                                                                    • Opcode Fuzzy Hash: cfd80b8924012b3a81ce264cde7180753b201b1e387c519ebd9873ce58afa85e
                                                                                    • Instruction Fuzzy Hash: 2B612232B191D189EB01CF7585014FD7FB1EB19794B868032EE9AAB746CE3CE116CB20
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                    • Instruction ID: 1db50593bfae32e166237a92759d81b3a93ba40f03c64e0860782d8a52e11752
                                                                                    • Opcode Fuzzy Hash: 8137a9b05b05aada6fbcd6bbdda66db02b1ef4637fe403d2df7c72722ebbdea5
                                                                                    • Instruction Fuzzy Hash: 2651EF73B181518BE7288F29A426BBD3771FB90B58F444134EB4A9BB89DE3DE541CB00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                    • Instruction ID: 0473afb5c61732a7df6b41c16bcc65f768fabd4c52974d2d6d48c3240f3edba9
                                                                                    • Opcode Fuzzy Hash: 525267a7f117e2089c634eae81b531c40420bccc1aa688f1dd99d62513960580
                                                                                    • Instruction Fuzzy Hash: CB31F5B2A085818BD718CE16DA6227E77F1F795350F448139EB4ADBB82DE7CE051C700
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                                                                                    • Instruction ID: 8dfea3125441590e283411a67cfb026471e656146b6e6563621cac00353a8159
                                                                                    • Opcode Fuzzy Hash: 20052d42666034676028b01d15d2cffdefdd266dec7e2dd0f98b8d8f07818195
                                                                                    • Instruction Fuzzy Hash: 51F06272B18695CBDBA48F29A84362A77F0F7483C0F848039E68DC7B04DA3D94619F14
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                    • Instruction ID: a93eaaf8931c8d463f16f0657dcaeef06e5979d81971f85ba179150102906943
                                                                                    • Opcode Fuzzy Hash: e57e15d0ab639cfe726454a8769b7378f2b682ff734fe90589bfb13db1bf513a
                                                                                    • Instruction Fuzzy Hash: 3BA0026190CD42F0E6548B20ECA64702730FB50700B540031F40DFD6A4DF3CB502C341
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID: :$EFS:$LOGGED_UTILITY_STREAM$:$I30:$INDEX_ALLOCATION$:$TXF_DATA:$LOGGED_UTILITY_STREAM$::$ATTRIBUTE_LIST$::$BITMAP$::$DATA$::$EA$::$EA_INFORMATION$::$FILE_NAME$::$INDEX_ALLOCATION$::$INDEX_ROOT$::$LOGGED_UTILITY_STREAM$::$OBJECT_ID$::$REPARSE_POINT
                                                                                    • API String ID: 3668304517-727060406
                                                                                    • Opcode ID: 036f0b4177b3bd4acf8be137eac01bdc749329f6e627dd372102b0288b9b6631
                                                                                    • Instruction ID: 7d15abb73520655ec82a5da09f5e04448c66ca1b4825ba42ab69d5a79c46a250
                                                                                    • Opcode Fuzzy Hash: 036f0b4177b3bd4acf8be137eac01bdc749329f6e627dd372102b0288b9b6631
                                                                                    • Instruction Fuzzy Hash: 7741F936B05F01E9EB109F65E4463E933B5EB48798F400136EA5CABB69EF38E255C340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                    • API String ID: 2565136772-3242537097
                                                                                    • Opcode ID: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                    • Instruction ID: 69c6538ff8839b5748014229d84599caf9bf413ae32934f2e8fa9aa3580635ba
                                                                                    • Opcode Fuzzy Hash: 6e1e709f092c3aabc6fb1c9db3d7c09c3ef1a4a7bf2af41e7ac9402dec2f511f
                                                                                    • Instruction Fuzzy Hash: 6B212A64E09B43D2FE649B61FC6797427B0EF48B90F441034E91EAABA5DF3CB6458300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                                                                    • String ID: DXGIDebug.dll$UNC$\\?\
                                                                                    • API String ID: 4097890229-4048004291
                                                                                    • Opcode ID: 56c6116d5534ddc5b4079fdeed8715d081fed04d0e9eb28ce3c332ce1ff1d7ed
                                                                                    • Instruction ID: 2d8835ae5b945c9919a14734648f95364c5d5b19ed9a31887c269c6eeb965727
                                                                                    • Opcode Fuzzy Hash: 56c6116d5534ddc5b4079fdeed8715d081fed04d0e9eb28ce3c332ce1ff1d7ed
                                                                                    • Instruction Fuzzy Hash: 7B12D232B09B42C0EB10DB64D4461AD6371EB81BA8F505135EE5DABBEADF3CE5A5C340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Global$AllocCreateStream
                                                                                    • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                    • API String ID: 2868844859-1533471033
                                                                                    • Opcode ID: 31d7dc5894d1c9fa85229d9e77b41a308ef747ae09a8312bf4b27f03762016a6
                                                                                    • Instruction ID: 5ec3977153a881e08c66a64c05aab9cca96227be37a856c2901b170d91428b19
                                                                                    • Opcode Fuzzy Hash: 31d7dc5894d1c9fa85229d9e77b41a308ef747ae09a8312bf4b27f03762016a6
                                                                                    • Instruction Fuzzy Hash: 3681AF62F18A46D5FB00DBB6D8422FD2371AF45798F400536EE1DAB79ADE38E50AC340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                    • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                                    • API String ID: 3215553584-2617248754
                                                                                    • Opcode ID: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                    • Instruction ID: 063ab641634b241306d59fc3e9c9f5bb9f60dcd0544aeb820029194e6b683623
                                                                                    • Opcode Fuzzy Hash: ca8329083cbd7a022b2adefca7a3bb58d0ae1dff90efa4c28dbe4d3f14657870
                                                                                    • Instruction Fuzzy Hash: 0441AD72A09B45D9E710CF25E8427E937B4EB14398F01523AEE5CABB54DE3CE126C344
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                                                                    • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                    • API String ID: 3936042273-1315819833
                                                                                    • Opcode ID: 100daac0e34165666268f43f408bc6971489d972bf40231fa28c726ba550acfe
                                                                                    • Instruction ID: 57264c309fe0406c02f00d8e72337f4e3b76add1125f514570ecf25f1bc999d5
                                                                                    • Opcode Fuzzy Hash: 100daac0e34165666268f43f408bc6971489d972bf40231fa28c726ba550acfe
                                                                                    • Instruction Fuzzy Hash: E4B1ADA2F19B46C5FB009BA5D4462BC2372EB86398F404235EE5CBABD9DE3CE545C340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$MessageSend$ClassLongNameObject
                                                                                    • String ID: STATIC
                                                                                    • API String ID: 3746718000-1882779555
                                                                                    • Opcode ID: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                    • Instruction ID: ce335b26b3eb2f5c8e46f98e409da7bebbab4299a816278c993ae874fb4c189a
                                                                                    • Opcode Fuzzy Hash: 028936735c5caa7e1c5955390d3996a5d13f8d6e72d7f98742e6e6c768b0ab82
                                                                                    • Instruction Fuzzy Hash: 9F316125B0C642C7FA609B22A5567B963B1BF8ABD0F441430FD4DABB56DE3CE4068780
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$CurrentDirectoryProcessSystem
                                                                                    • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                                                    • API String ID: 2915667086-2207617598
                                                                                    • Opcode ID: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                                                    • Instruction ID: 33f4fb90539b7dbf0df09c732a229f904286d62c8580dd769d71a805099cc238
                                                                                    • Opcode Fuzzy Hash: d2e93635ec338890dfe438c4789fcaf7e26687fbfe6c7ce53d5981307f2d6baa
                                                                                    • Instruction Fuzzy Hash: 4F316674A0DB02D1FA148B56B9521792FB0FF44BA0F080135F84EAFBA9EE3CE6519300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID: $
                                                                                    • API String ID: 3668304517-227171996
                                                                                    • Opcode ID: 7957b1f7c23d8b99e8b957fd2374c8a83d1170bc9397b993806739df2f8497c6
                                                                                    • Instruction ID: 32f8bbbb8c5aab965a3a27034545395aa8166cde9f83ac7e5c41d6beb9a3b37e
                                                                                    • Opcode Fuzzy Hash: 7957b1f7c23d8b99e8b957fd2374c8a83d1170bc9397b993806739df2f8497c6
                                                                                    • Instruction Fuzzy Hash: 57F1E162F15B46C0EE109B66D44A5BC2371AB46BA8F405231EF6DAB7D6DF7CE190C340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                                                                    • String ID: csm$csm$csm
                                                                                    • API String ID: 2940173790-393685449
                                                                                    • Opcode ID: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                    • Instruction ID: 4578ccca475f90f028ef8fa68056a117cf6483215d750eba2f48bb900bfb5cca
                                                                                    • Opcode Fuzzy Hash: 65edb01f61f21fff02eaccc9a46b43a233fa456fccf40e480b66f774ee54b1a7
                                                                                    • Instruction Fuzzy Hash: 88E18E72A18682CAE7209B35D4823AD7BB4FB45798F144135EE8DAB796CF38F485C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocClearStringVariant
                                                                                    • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                    • API String ID: 1959693985-3505469590
                                                                                    • Opcode ID: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                    • Instruction ID: f850edb524e651a2d66e67fd0f02db4bf16aa736982a124a7e916862058eb810
                                                                                    • Opcode Fuzzy Hash: a8b35b7bcd37d82ee4aaa20c3b876beaab518b1de9e1ce59ea14af8b32f1fe8d
                                                                                    • Instruction Fuzzy Hash: 02713836A15B05D6EB20DF25E8815AD7BB0FB88B98F045132EA4E9BB64CF3DD654C300
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemTextWindow
                                                                                    • String ID: LICENSEDLG
                                                                                    • API String ID: 2478532303-2177901306
                                                                                    • Opcode ID: e29db3841e3cac596c2aa5df9f59b5580221106af80a371471668d29e16b4ce4
                                                                                    • Instruction ID: 1909ff3b5148a22c4b91712e9a8a67e08659adf3fa4eb1cd156ba49e5573d6f3
                                                                                    • Opcode Fuzzy Hash: e29db3841e3cac596c2aa5df9f59b5580221106af80a371471668d29e16b4ce4
                                                                                    • Instruction Fuzzy Hash: 92418B65E0CA22C2FB109B62E85677922B0EF85F84F045034FA0EABB95CF3CE5468341
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF663C774F3,?,?,?,00007FF663C7525E,?,?,?,00007FF663C75219), ref: 00007FF663C77371
                                                                                    • GetLastError.KERNEL32(?,?,00000000,00007FF663C774F3,?,?,?,00007FF663C7525E,?,?,?,00007FF663C75219), ref: 00007FF663C7737F
                                                                                    • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF663C774F3,?,?,?,00007FF663C7525E,?,?,?,00007FF663C75219), ref: 00007FF663C773A9
                                                                                    • FreeLibrary.KERNEL32(?,?,00000000,00007FF663C774F3,?,?,?,00007FF663C7525E,?,?,?,00007FF663C75219), ref: 00007FF663C773EF
                                                                                    • GetProcAddress.KERNEL32(?,?,00000000,00007FF663C774F3,?,?,?,00007FF663C7525E,?,?,?,00007FF663C75219), ref: 00007FF663C773FB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 2559590344-2084034818
                                                                                    • Opcode ID: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                    • Instruction ID: 0e029ca2f5c570d4f84d2a96014db14b5fde919e212a9035cb0d8a163a1bbd79
                                                                                    • Opcode Fuzzy Hash: eedfc97f7024c66fbeb39a7219499b253e22696fd1fdab2c5f769bf1fd383016
                                                                                    • Instruction Fuzzy Hash: B631F221B1A746D1EE21AB06A80257927B4FF48BA0F194635FD1DAF790DF3CF0409710
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(?,?,?,00007FF663C71573,?,?,?,00007FF663C7192A), ref: 00007FF663C7162B
                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF663C71573,?,?,?,00007FF663C7192A), ref: 00007FF663C71648
                                                                                    • GetProcAddress.KERNEL32(?,?,?,00007FF663C71573,?,?,?,00007FF663C7192A), ref: 00007FF663C71664
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                    • API String ID: 667068680-1718035505
                                                                                    • Opcode ID: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                    • Instruction ID: 739da69e7e3924410cf780ec7bc9c46221f5343b4b2ea3cf96e81f5b185c0707
                                                                                    • Opcode Fuzzy Hash: 4fe35f58cd4175722fa2f4edd42b7d77b08fa8d78ae8e9bf73ccac7c2071e7f8
                                                                                    • Instruction Fuzzy Hash: ED115B20A0EB42D2FE759B08A9622741AB1EF08B94F5C5439ED1DAE790EE3CB5948600
                                                                                    APIs
                                                                                      • Part of subcall function 00007FF663C551A4: GetVersionExW.KERNEL32 ref: 00007FF663C551D5
                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF663C45AB4), ref: 00007FF663C5ED8C
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF663C45AB4), ref: 00007FF663C5ED98
                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF663C45AB4), ref: 00007FF663C5EDA8
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF663C45AB4), ref: 00007FF663C5EDB6
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF663C45AB4), ref: 00007FF663C5EDC4
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00007FF663C45AB4), ref: 00007FF663C5EE05
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                                    • String ID:
                                                                                    • API String ID: 2092733347-0
                                                                                    • Opcode ID: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                    • Instruction ID: c96e0c944d5edd911216ec91cc775008f3e8a918b311d1330dc41243da17b64d
                                                                                    • Opcode Fuzzy Hash: 197518eb8103cda2bd6b54f1f5e99fa721289ee203340eaf45d2c62117a67569
                                                                                    • Instruction Fuzzy Hash: 52516AB2B14651CAEB14CFB9D4415AC37B1F748B98B60503AEE0DABB58DF38E556C700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                                                    • String ID:
                                                                                    • API String ID: 2092733347-0
                                                                                    • Opcode ID: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                    • Instruction ID: 4c653fff30b86cc6d796f12e2577c456ea58fad61482403ba202678caf75a440
                                                                                    • Opcode Fuzzy Hash: 93bf5fe4be91675a5f4cba4a2df0f2c5ed0bd126a165fd4d88c3e7d5e64543a6
                                                                                    • Instruction Fuzzy Hash: 9B313B66B10A51DEFB14CFB5D8811AC3770FB08758B54502AEE0EA7B58EF38E595C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID: .rar$exe$rar$sfx
                                                                                    • API String ID: 3668304517-630704357
                                                                                    • Opcode ID: 2fc35cbdd70ebaba8229e08f8487c40f3259a53efddd90ef8447a9b59f22dcea
                                                                                    • Instruction ID: ced037a51e7dafd762a35b64eb889d34f3be1846dbb364dac57035b9c2a1ee45
                                                                                    • Opcode Fuzzy Hash: 2fc35cbdd70ebaba8229e08f8487c40f3259a53efddd90ef8447a9b59f22dcea
                                                                                    • Instruction Fuzzy Hash: F8A19E32A14B06D0EB049B25D8566BC2371EF40BA8F505231ED5DAB7EADF3CE5A1D340
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: abort$CallEncodePointerTranslator
                                                                                    • String ID: MOC$RCC
                                                                                    • API String ID: 2889003569-2084237596
                                                                                    • Opcode ID: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                    • Instruction ID: e3b335fe9f0fa77929b73b1521a31a2c5f4ca4ba33f4212fca59c3d3d1280959
                                                                                    • Opcode Fuzzy Hash: 0f4c2d06ef2d655583c55900dbb020dcf620b12558a4295111afe460be181df6
                                                                                    • Instruction Fuzzy Hash: 39918E73A18B91CAE710CB65E8812AD7BB0FB44788F144129FE4DABB55DF38E195CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                    • String ID: csm$f
                                                                                    • API String ID: 2395640692-629598281
                                                                                    • Opcode ID: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                    • Instruction ID: 20750b2ccfe06cba7f7a7f274e70dda1db157762cb0076a1df64dda2f2fbbaab
                                                                                    • Opcode Fuzzy Hash: a7c39da158025e753bf36dfb1e051fd0b17def11f5f8def40396cbfe1c046983
                                                                                    • Instruction Fuzzy Hash: BA519D32A19602D7EB14CB15E845A2937B5FB40B88F518034FE5AAB788DF79F941C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$CloseCurrentHandleProcess
                                                                                    • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                    • API String ID: 2102711378-639343689
                                                                                    • Opcode ID: 6c1d5a5d5395298d9d74f6f4ee4569930d238c95dd33962f37e3fdaa32d53d1a
                                                                                    • Instruction ID: 22d0b48629dd72951d193a8f312d0aaf053c689e9a9cf51e8f5af2e3e06e3ed1
                                                                                    • Opcode Fuzzy Hash: 6c1d5a5d5395298d9d74f6f4ee4569930d238c95dd33962f37e3fdaa32d53d1a
                                                                                    • Instruction Fuzzy Hash: 0C51BC62F18752D6FB10EB74D8462BD27B1AF847A4F000131EE1DAB7A7DE3CA485C200
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Show$Rect
                                                                                    • String ID: RarHtmlClassName
                                                                                    • API String ID: 2396740005-1658105358
                                                                                    • Opcode ID: 2556132b3669e06fd82c4edcfb73ee53acbff31ec70f5bbfd324b20a510b6699
                                                                                    • Instruction ID: f640fe2ef11292c8c0b3dffad4ab0889bc2857e7f7c2cd6507559b4594ab9dac
                                                                                    • Opcode Fuzzy Hash: 2556132b3669e06fd82c4edcfb73ee53acbff31ec70f5bbfd324b20a510b6699
                                                                                    • Instruction Fuzzy Hash: 9B517322A09B42C6EB249B26E45637A77B0FF85B80F045535EE8E9BB55DF3CE0458700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                                                                    • String ID: sfxcmd$sfxpar
                                                                                    • API String ID: 3540648995-3493335439
                                                                                    • Opcode ID: 65c4bc3e57016a74e8805048ea790c6f4a694eba210e4a6448e418b17608a108
                                                                                    • Instruction ID: f3eb32f0ff80d4cce5c09ad3edb898191e160517dca093ed09042a14cba86d3b
                                                                                    • Opcode Fuzzy Hash: 65c4bc3e57016a74e8805048ea790c6f4a694eba210e4a6448e418b17608a108
                                                                                    • Instruction Fuzzy Hash: 03315032A14B15D8EB048F66E4861BC23B1EB45B98F140131EE5DAB7A9DE38E141C344
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                    • API String ID: 0-56093855
                                                                                    • Opcode ID: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                    • Instruction ID: e5a310d2eafb9b28958424c6a2cf7fa6cb9e9b125b9a9b40d03b4c8fd2b1f67b
                                                                                    • Opcode Fuzzy Hash: 98f895654b64cd1d2f90e97d30244ed9b67d31cc2014a88c355cd353264df31a
                                                                                    • Instruction Fuzzy Hash: 85211925E0DB87D6FA108B66A8461B427F4BB8AB88F141036F94DEB765DE3CE184D341
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                    • Instruction ID: 5172c4db3bfecdf046084459f9fb104119d337c57c73a740c420a352cc301261
                                                                                    • Opcode Fuzzy Hash: 42a4ca90c7c49dddb16080121233970ff8583544d2054868cb5f0899d871e2db
                                                                                    • Instruction Fuzzy Hash: 18F04F21A19B42D1EF548B11F45167967B0AF88B90F445035F94F9AB65DE3CE5848700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                    • String ID:
                                                                                    • API String ID: 3215553584-0
                                                                                    • Opcode ID: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                    • Instruction ID: 1efc48eca174523c20146a5a276b4d2af804a5898668f7f9c3abb01bd0e057a0
                                                                                    • Opcode Fuzzy Hash: cf462e6f26ae3af6f96c078c51b53c82231ed120809331cf2f591469c69a5a17
                                                                                    • Instruction Fuzzy Hash: 4181D262E18652E5F7209B6588426BD2FB8BB45B98F404135ED0EFB795CF3CA641C700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 2398171386-0
                                                                                    • Opcode ID: 14fdea18fdcf977c61dce6ecaccc8aa35300d093acc7d7c713630260d7cb0aba
                                                                                    • Instruction ID: a09d01961f473ec2cc04f4cd8b66194d55690b41ab21a34a31979453bacce6c6
                                                                                    • Opcode Fuzzy Hash: 14fdea18fdcf977c61dce6ecaccc8aa35300d093acc7d7c713630260d7cb0aba
                                                                                    • Instruction Fuzzy Hash: CF519172B14B42D9FB60CB75E8423BD73B1AB447A8F004635EE1DAB7D5EE3895658300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 3659116390-0
                                                                                    • Opcode ID: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                    • Instruction ID: 061453bb3ad6a648bf9e12942db6f00e3e0cc822bfa6dafb6545ba7de411f649
                                                                                    • Opcode Fuzzy Hash: 8f90b3f8899b92826fb288bc35eb601c263b89b4fb676f823db5d062d6f6b41f
                                                                                    • Instruction Fuzzy Hash: A551E132A14A51D9E710CF25E8463AD3BB5FB44B98F048135EE4EABB98DF38D245C700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocString
                                                                                    • String ID:
                                                                                    • API String ID: 262959230-0
                                                                                    • Opcode ID: 8c2dc27bb1e4af113538b7172bb6dd323e96cb8c94470b0dbd49c9d6f404eed7
                                                                                    • Instruction ID: f7c0e16bcbc7c31b86c894c4f63b5cfab78d560379d7efb8869c33bb33ae4348
                                                                                    • Opcode Fuzzy Hash: 8c2dc27bb1e4af113538b7172bb6dd323e96cb8c94470b0dbd49c9d6f404eed7
                                                                                    • Instruction Fuzzy Hash: 8341C221A09746C9EB149F29986227922B4EF44BA4F144634FE6DEBBD6DF3CF1428300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID:
                                                                                    • API String ID: 190572456-0
                                                                                    • Opcode ID: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                    • Instruction ID: 594d7f036e5f8ad002e6f210f4471dab4f8e863f5f89e072153d39dec305b6ba
                                                                                    • Opcode Fuzzy Hash: d8da239e760e4119be076ce5ae60c5d71a4e7276355522d8061e2664917ecd9d
                                                                                    • Instruction Fuzzy Hash: 1441E062B09A42DAFA559F22A84267562F5BF14BE0F094535EE1DEFB84EE3CF0008300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _set_statfp
                                                                                    • String ID:
                                                                                    • API String ID: 1156100317-0
                                                                                    • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                    • Instruction ID: 854ba60887c26e2fbf468c62ffad0f74f4cd0e63afb7e26c93c860e09def0737
                                                                                    • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                                                                    • Instruction Fuzzy Hash: 7811BF36E3CA07E1F6540124E54337A0DB26F453A0E498234FA7FAE7D6CEFCAA404205
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: __except_validate_context_recordabort
                                                                                    • String ID: csm$csm
                                                                                    • API String ID: 746414643-3733052814
                                                                                    • Opcode ID: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                    • Instruction ID: cfb2422a270f52afd5ee9af6ac0e2eb52c9dd34c7a3eab4e88beb79b96dbfada
                                                                                    • Opcode Fuzzy Hash: 91fc108a1c492767e4bb41002f60c2920875b1ec76e01922ab372504797a4c8e
                                                                                    • Instruction Fuzzy Hash: 85716F72608A92C6D7608B25D45177D7BB0EB05B89F148135EE4CABB85CF3CF5A5C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                    • String ID: $*
                                                                                    • API String ID: 3215553584-3982473090
                                                                                    • Opcode ID: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                    • Instruction ID: 853e92495b3fe92a070051fa6b8dd65d48300d3893e73a2e0bde0ff43bda1504
                                                                                    • Opcode Fuzzy Hash: 42643a1ee39b50d27a50b926b179a62c0cdc4d381fe14b17104e750277292b9f
                                                                                    • Instruction Fuzzy Hash: 17512D7290CB42CAE7A49E28C44B7783BB1FB05B1AF151135EF4AA9399CF2DF481D605
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$StringType
                                                                                    • String ID: $%s
                                                                                    • API String ID: 3586891840-3791308623
                                                                                    • Opcode ID: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                    • Instruction ID: ef494004097aa3e70a4f53d5fb563834b6b06f413808c60b50b4f1e73a8b6060
                                                                                    • Opcode Fuzzy Hash: 8174e861c2faa6f2f7f5292a0ee7474812abc1109b8acb2517e9a7bc716d8d39
                                                                                    • Instruction Fuzzy Hash: FE419523B14B81DAEB618F25D8026A927F1FB44BA8F494635EE2D9B7C5DF3CE5418300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFrameInfo__except_validate_context_recordabort
                                                                                    • String ID: csm
                                                                                    • API String ID: 2466640111-1018135373
                                                                                    • Opcode ID: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                    • Instruction ID: 0b410b2c82ba939f4058c765a3593567e7d645e62d59d1675b262afacb09ae87
                                                                                    • Opcode Fuzzy Hash: ef48871438151390fa300b301edbe87f2aaf35895cd4fd9de5e2d21b12dcaab2
                                                                                    • Instruction Fuzzy Hash: BB511872619B42C7E620AB26A44226E77B4FB89B90F140535EE8D9BB55CF38F461CB00
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                                    • String ID: U
                                                                                    • API String ID: 2456169464-4171548499
                                                                                    • Opcode ID: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                    • Instruction ID: edbe6250c8b774a3a2fde5b0fe9a8797deb3d6ef1ad94eeab39e56b3ac42add2
                                                                                    • Opcode Fuzzy Hash: a3c4996b5397ae7c68c43f4944c85cd830f0b958292ccb38960a62bfe152ddee
                                                                                    • Instruction Fuzzy Hash: 1641C222618A81D2D7208F25E8457AA6BB4FB98794F804031FE4DDB794DF3CD545C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectRelease
                                                                                    • String ID:
                                                                                    • API String ID: 1429681911-3916222277
                                                                                    • Opcode ID: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                    • Instruction ID: f5790c525d8ed1c39a7aec97136c22debe0fb5c188f485892584658badb2ffee
                                                                                    • Opcode Fuzzy Hash: 0b5772d91688d342ea342be5c9c3c9ea07a5ad9e93d570546deb1a9808731c40
                                                                                    • Instruction Fuzzy Hash: 8F314A3660874287EB049F22B81962AB7B0FB89FD1F405435EE4A97B54CE3CE449DB80
                                                                                    APIs
                                                                                    • InitializeCriticalSection.KERNEL32(?,?,?,00007FF663C6317F,?,?,00001000,00007FF663C4E51D), ref: 00007FF663C5E8BB
                                                                                    • CreateSemaphoreW.KERNEL32(?,?,?,00007FF663C6317F,?,?,00001000,00007FF663C4E51D), ref: 00007FF663C5E8CB
                                                                                    • CreateEventW.KERNEL32(?,?,?,00007FF663C6317F,?,?,00001000,00007FF663C4E51D), ref: 00007FF663C5E8E4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                    • String ID: Thread pool initialization failed.
                                                                                    • API String ID: 3340455307-2182114853
                                                                                    • Opcode ID: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                    • Instruction ID: 3cb917d19ada58ad417cbe200afdd67c2f50de1d6f5e05c7d8997e09162b3763
                                                                                    • Opcode Fuzzy Hash: 6610cce2f1ff4f40d78c24fcbab0d777ace7136147ab701da82aad1b7a389e44
                                                                                    • Instruction Fuzzy Hash: 8121C072A19602C6F7108F38E4467FD36B2EB88B18F188034DA4D8E395CF7E94558784
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDeviceRelease
                                                                                    • String ID:
                                                                                    • API String ID: 127614599-3916222277
                                                                                    • Opcode ID: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                    • Instruction ID: 2a73987a500b5bd009d8e8f57680b024ae40b724d92f67f17641c82aa513f5b8
                                                                                    • Opcode Fuzzy Hash: a42f7bf34e2550c06df92b4c4441a28b155cc5d7cfc3f2a0da00e80f490195b4
                                                                                    • Instruction Fuzzy Hash: 5EE0C220B08641C3FB0857B6B58A03A2271AB4CBD0F15A135EA1F8BB94CE3CD8C44300
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$FileTime
                                                                                    • String ID:
                                                                                    • API String ID: 1137671866-0
                                                                                    • Opcode ID: 6a66750d7d38e285348c6a4672a5517d432b12a502a6a2b91e6f62eece89d76d
                                                                                    • Instruction ID: 450b10290a5249f24bc8439da5629c520af385554997b9fbf6d9c4bd135d2372
                                                                                    • Opcode Fuzzy Hash: 6a66750d7d38e285348c6a4672a5517d432b12a502a6a2b91e6f62eece89d76d
                                                                                    • Instruction Fuzzy Hash: 75A19F62A18B82C1EB10EB65E8461AD6371FF85794F405131FA9DABBABDF3CE544C700
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1452528299-0
                                                                                    • Opcode ID: 1845b41a9133370ecc17a109e2984b8a28ed2f66ab94446e4893adb0daee51a6
                                                                                    • Instruction ID: 65c3eb1d0692d2f272415c45e4948a06581b347e3882220dbfb8e592020fedca
                                                                                    • Opcode Fuzzy Hash: 1845b41a9133370ecc17a109e2984b8a28ed2f66ab94446e4893adb0daee51a6
                                                                                    • Instruction Fuzzy Hash: 90517E72B18B46D5FB009B69D4562FC2371EB85B98F404131EE5CABBDAEE28E245C340
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                                    • String ID:
                                                                                    • API String ID: 1077098981-0
                                                                                    • Opcode ID: 5a43cb7f5a8bc2b697eb0b834037522765625dc86c8d5e2913923eaf6a834e49
                                                                                    • Instruction ID: d56821ade7097bb0d57207f0259a2cd6130378dbceb3db66141af96bb1ad240d
                                                                                    • Opcode Fuzzy Hash: 5a43cb7f5a8bc2b697eb0b834037522765625dc86c8d5e2913923eaf6a834e49
                                                                                    • Instruction Fuzzy Hash: 97514932A18B42C6E7508F62E8457AA77B4FB85B84F501035FA4EABB54DF3CE505CB40
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 4141327611-0
                                                                                    • Opcode ID: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                    • Instruction ID: 8dc9fa5c5b312b62f3d24f0b8601037af6d68eb7a7fabeb3244eb71c801e9e96
                                                                                    • Opcode Fuzzy Hash: fdb879c7c344a6dcddabd48f24568e2f5e84c2dc3f6ceef9c32cec135b3ccbbf
                                                                                    • Instruction Fuzzy Hash: A8419132A08782C6FB619A14954A37977B0EF80B90F188131FE4DAEB99DF7CF8418600
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileMove_invalid_parameter_noinfo_noreturn
                                                                                    • String ID:
                                                                                    • API String ID: 3823481717-0
                                                                                    • Opcode ID: 47dbf0decc8272d9a7ae459b130201949f9107b8ec80fb87a20ec63cf3da1f82
                                                                                    • Instruction ID: 7d6fe332d1e242d1158e8e1017691ce60316b44a3b8546e501942fac478f0123
                                                                                    • Opcode Fuzzy Hash: 47dbf0decc8272d9a7ae459b130201949f9107b8ec80fb87a20ec63cf3da1f82
                                                                                    • Instruction Fuzzy Hash: 3B418F62F14B52C4FB00CBB5D8862AC2372BB84BA8B105235EE5DAAB99DF78D455C300
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF663C7C45B), ref: 00007FF663C80B91
                                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF663C7C45B), ref: 00007FF663C80BF3
                                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF663C7C45B), ref: 00007FF663C80C2D
                                                                                    • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF663C7C45B), ref: 00007FF663C80C57
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                                    • String ID:
                                                                                    • API String ID: 1557788787-0
                                                                                    • Opcode ID: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                    • Instruction ID: 08392d5d4851009e456b06cbd89baa8566a75c94b6ebf066178ac6421fcd6831
                                                                                    • Opcode Fuzzy Hash: 23704c5f87cc5d65a6a85ab0da0438508b9fc27f2b888927c3d6011bf25654c1
                                                                                    • Instruction Fuzzy Hash: 9F216431B19B61D1E6349F11A44102A7AB4FB54BD0F484134EE9EBBB94DF3CE5528304
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$abort
                                                                                    • String ID:
                                                                                    • API String ID: 1447195878-0
                                                                                    • Opcode ID: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                    • Instruction ID: 5183456647c5a1de9716166697dce380aa36144fada9156be63913f50f4f745b
                                                                                    • Opcode Fuzzy Hash: df247b5a3948333368795c339682862bf84e23f7c025c70b8dad3e7beb060077
                                                                                    • Instruction Fuzzy Hash: 3D015A21B0D703C6FA68A721E65B53C62B1AF44790F144438FD1EEEBD6EE2CB8408200
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDevice$Release
                                                                                    • String ID:
                                                                                    • API String ID: 1035833867-0
                                                                                    • Opcode ID: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                    • Instruction ID: 95a3062b28ec528043e14ae675b3f50a5618a239422584af6bb43849e6d39665
                                                                                    • Opcode Fuzzy Hash: de15d0a72ac65e47349a1b4cc9ca260558533dfe27db70e7b1e031f833f09c6c
                                                                                    • Instruction Fuzzy Hash: EAE01260F09702C3FF085BB1686A13621B0AF49741F085439E81FEE354DE3CA585D710
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn
                                                                                    • String ID: DXGIDebug.dll
                                                                                    • API String ID: 3668304517-540382549
                                                                                    • Opcode ID: ccd1447265edc33aa01f142b30f3ce6f8137da9441e4f52810f95d7140ffd7c2
                                                                                    • Instruction ID: b9e0d058978aa422ec907d4fc363bc3a0ae61065fa494c022d7d16ca4408a836
                                                                                    • Opcode Fuzzy Hash: ccd1447265edc33aa01f142b30f3ce6f8137da9441e4f52810f95d7140ffd7c2
                                                                                    • Instruction Fuzzy Hash: A3719972A14B81C6EB14CB65E8453ADB3B8FB54794F044225EFAD5BB96DF78E061C300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo
                                                                                    • String ID: e+000$gfff
                                                                                    • API String ID: 3215553584-3030954782
                                                                                    • Opcode ID: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                    • Instruction ID: 240056b1bc46c8fb2e75a0402046557c6cb45443bd87317ab5cab2341acf9a0a
                                                                                    • Opcode Fuzzy Hash: ffbcb58cc87a1110f60409a8afde5d08377aab6ce8cf060c3284a5669936e3c2
                                                                                    • Instruction Fuzzy Hash: B251E863B187C186E7658B3599423A96BB1EB41B90F08A231EE9CDBBD5CF2CF444C700
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                                                                    • String ID: SIZE
                                                                                    • API String ID: 449872665-3243624926
                                                                                    • Opcode ID: 1ee6a6b9fbbd6c3126f8bc5ffec1b6aa008f2877db1f13591811bbd6ed408201
                                                                                    • Instruction ID: 667c817388698562abb9e04e8775133d36c5352a0c0a35cc93b4806ff3a741a0
                                                                                    • Opcode Fuzzy Hash: 1ee6a6b9fbbd6c3126f8bc5ffec1b6aa008f2877db1f13591811bbd6ed408201
                                                                                    • Instruction Fuzzy Hash: 7041A5B2A18646C5EA10DF18E4463BD6370EF957A4F904331FA9D9A7D6EE3CE550C700
                                                                                    APIs
                                                                                    Strings
                                                                                    • C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe, xrefs: 00007FF663C7C2F9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileModuleName_invalid_parameter_noinfo
                                                                                    • String ID: C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe
                                                                                    • API String ID: 3307058713-2416208979
                                                                                    • Opcode ID: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                    • Instruction ID: 78d73fc4bbc8649ccd18298929f168b5106e4d675335ecb39f794cccb32b347f
                                                                                    • Opcode Fuzzy Hash: 2b307fc7043d57580c2760bc14d10e66149d3294dbd6a1f00798eb6953a6f573
                                                                                    • Instruction Fuzzy Hash: 70416A32E08A56CAEB549F25A4820BC77B4EF84B94B448036FE4EABB55DE3DF4418740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide_snwprintf
                                                                                    • String ID: $%s$@%s
                                                                                    • API String ID: 2650857296-834177443
                                                                                    • Opcode ID: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                    • Instruction ID: b896b4687be70f92b17dae9b484516d5a939e7f88ce4b9ad4e7c90cf082fb713
                                                                                    • Opcode Fuzzy Hash: 68d6d98aec82f67e7f26d78b4367655257a27e60e60eb814561ac576190adeba
                                                                                    • Instruction Fuzzy Hash: 6F31E1B2B19A46D6EA508F26E4426E923B0FB44BD4F400032FE0DAB795EE3DE515C740
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: DialogParamVisibleWindow
                                                                                    • String ID: GETPASSWORD1
                                                                                    • API String ID: 3157717868-3292211884
                                                                                    • Opcode ID: 3689008c5ae976a1f3a242e5b1eb30ef9737a63c20829ff4d7ba5964f065d3d0
                                                                                    • Instruction ID: 20dc51f89aa2d84e6beb6a629d8582ac5c5b8e3ee94f6945678d06bf5f59edfb
                                                                                    • Opcode Fuzzy Hash: 3689008c5ae976a1f3a242e5b1eb30ef9737a63c20829ff4d7ba5964f065d3d0
                                                                                    • Instruction Fuzzy Hash: F1314126E0D7D2C6EA008B62A8521B92B70BF45B84F485075FD8DBF76ACE2CF444D750
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileHandleType
                                                                                    • String ID: @
                                                                                    • API String ID: 3000768030-2766056989
                                                                                    • Opcode ID: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                    • Instruction ID: 0e7313351eddc10cc40f82485f9478c6daf083bea10eafc58bf297348905774b
                                                                                    • Opcode Fuzzy Hash: 01c4e23626c5bd34e0d32a71787dfe5976e9b76bf070a7e2fa99837352baeece
                                                                                    • Instruction Fuzzy Hash: 78219523A09782C1EB608B3594961792E71EB45774F282335EA6FAB7D4CE3DF881C345
                                                                                    APIs
                                                                                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF663C71D3E), ref: 00007FF663C740BC
                                                                                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF663C71D3E), ref: 00007FF663C74102
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFileHeaderRaise
                                                                                    • String ID: csm
                                                                                    • API String ID: 2573137834-1018135373
                                                                                    • Opcode ID: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                    • Instruction ID: 22953e5542aab47869f3065e87e22b5ed0720e4a4d65652ec43025cac7d759aa
                                                                                    • Opcode Fuzzy Hash: 995ce70781ed1107fbe35a2df86b6ab92d82f2488d4e31342cdb9a65d606da21
                                                                                    • Instruction Fuzzy Hash: 0E113A32608B8182EB208B15E44126ABBF1FB88B94F184231EF8D5BB68DF3CD555CB00
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00007FF663C5E95F,?,?,?,00007FF663C5463A,?,?,?), ref: 00007FF663C5EA63
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF663C5E95F,?,?,?,00007FF663C5463A,?,?,?), ref: 00007FF663C5EA6E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastObjectSingleWait
                                                                                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                    • API String ID: 1211598281-2248577382
                                                                                    • Opcode ID: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                    • Instruction ID: 64bbe3ed2f011db4a49e9275c5034477473962a8e066aece6ab6cdb731c8735b
                                                                                    • Opcode Fuzzy Hash: 98ce5a6e9b01a49333d4d7b683bb298ff4a8e953ba0927a3bf2f7aa8eb90df55
                                                                                    • Instruction Fuzzy Hash: C5E01A21E19A12D2F610A7349C834B82630BF607B0F900330F03EE97E19F2CAA458300
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2694586939.00007FF663C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF663C40000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2694554690.00007FF663C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694655575.00007FF663C88000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694696133.00007FF663CA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2694764032.00007FF663CAE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7ff663c40000_Request for Quotations and specifications.jbxd
                                                                                    Similarity
                                                                                    • API ID: FindHandleModuleResource
                                                                                    • String ID: RTL
                                                                                    • API String ID: 3537982541-834975271
                                                                                    • Opcode ID: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                    • Instruction ID: 027b12d358cc577e2049cd9863447382dd6896fa545bfc4e8b284d54fd56197e
                                                                                    • Opcode Fuzzy Hash: e39cf6139d6c3c808756c827088780cb49cd2dd94430b396554b51375d39015a
                                                                                    • Instruction Fuzzy Hash: 46D017A5F09702D2FF298BA2A44A7341A705B18B42F485038D80A9A390EF3D9298C750

                                                                                    Execution Graph

                                                                                    Execution Coverage:36.7%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:40
                                                                                    Total number of Limit Nodes:2
                                                                                    execution_graph 1634 2b53230 1635 2b5324a 1634->1635 1636 2b532a6 1635->1636 1638 2b532df 1635->1638 1639 2b53323 1638->1639 1667 2b52d96 1639->1667 1671 2b52da0 1639->1671 1640 2b5354c 1641 2b53655 1640->1641 1651 2b527d0 Wow64SetThreadContext 1640->1651 1652 2b527c8 Wow64SetThreadContext 1640->1652 1665 2b52b70 ReadProcessMemory 1641->1665 1666 2b52b68 ReadProcessMemory 1641->1666 1642 2b53760 1657 2b528f0 VirtualAllocEx 1642->1657 1658 2b528f8 VirtualAllocEx 1642->1658 1643 2b5389b 1649 2b52a10 WriteProcessMemory 1643->1649 1650 2b52a18 WriteProcessMemory 1643->1650 1644 2b53bcb 1663 2b52a10 WriteProcessMemory 1644->1663 1664 2b52a18 WriteProcessMemory 1644->1664 1645 2b539a6 1645->1644 1659 2b52a10 WriteProcessMemory 1645->1659 1660 2b52a18 WriteProcessMemory 1645->1660 1646 2b53c0c 1647 2b53d1e 1646->1647 1661 2b527d0 Wow64SetThreadContext 1646->1661 1662 2b527c8 Wow64SetThreadContext 1646->1662 1653 2b526e0 ResumeThread 1647->1653 1654 2b526d8 ResumeThread 1647->1654 1648 2b53dfc 1648->1635 1649->1645 1650->1645 1651->1641 1652->1641 1653->1648 1654->1648 1657->1643 1658->1643 1659->1645 1660->1645 1661->1647 1662->1647 1663->1646 1664->1646 1665->1642 1666->1642 1668 2b52da4 CreateProcessA 1667->1668 1670 2b5307c 1668->1670 1670->1670 1672 2b52e27 CreateProcessA 1671->1672 1674 2b5307c 1672->1674 1674->1674 1675 2b53222 1677 2b53230 1675->1677 1676 2b532a6 1677->1676 1678 2b532df 12 API calls 1677->1678 1678->1677
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e3619a850fea918183041f934f0a1761247d8622a29f82733de83d3d3a54c264
                                                                                    • Instruction ID: c3b17ca23b3a2344c0176eaa03ae5e711bfc30ab3cc487d49f1a607fb9f1e2a8
                                                                                    • Opcode Fuzzy Hash: e3619a850fea918183041f934f0a1761247d8622a29f82733de83d3d3a54c264
                                                                                    • Instruction Fuzzy Hash: A1510474E01218CFDB18DFAAD494AADFBF2BF89300F14946AD815AB354DB35A942CF14

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 171 2b52d96-2b52e39 174 2b52e82-2b52eaa 171->174 175 2b52e3b-2b52e52 171->175 178 2b52ef0-2b52f46 174->178 179 2b52eac-2b52ec0 174->179 175->174 180 2b52e54-2b52e59 175->180 189 2b52f8c-2b5307a CreateProcessA 178->189 190 2b52f48-2b52f5c 178->190 179->178 187 2b52ec2-2b52ec7 179->187 181 2b52e7c-2b52e7f 180->181 182 2b52e5b-2b52e65 180->182 181->174 184 2b52e67 182->184 185 2b52e69-2b52e78 182->185 184->185 185->185 188 2b52e7a 185->188 191 2b52ec9-2b52ed3 187->191 192 2b52eea-2b52eed 187->192 188->181 208 2b53083-2b53168 189->208 209 2b5307c-2b53082 189->209 190->189 197 2b52f5e-2b52f63 190->197 194 2b52ed5 191->194 195 2b52ed7-2b52ee6 191->195 192->178 194->195 195->195 198 2b52ee8 195->198 199 2b52f65-2b52f6f 197->199 200 2b52f86-2b52f89 197->200 198->192 202 2b52f71 199->202 203 2b52f73-2b52f82 199->203 200->189 202->203 203->203 204 2b52f84 203->204 204->200 221 2b53178-2b5317c 208->221 222 2b5316a-2b5316e 208->222 209->208 224 2b5318c-2b53190 221->224 225 2b5317e-2b53182 221->225 222->221 223 2b53170 222->223 223->221 226 2b531a0-2b531a4 224->226 227 2b53192-2b53196 224->227 225->224 228 2b53184 225->228 230 2b531a6-2b531cf 226->230 231 2b531da-2b531e5 226->231 227->226 229 2b53198 227->229 228->224 229->226 230->231 235 2b531e6 231->235 235->235
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02B53067
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: 1a0a37c6b97886efbc57f785da64b14554a39177fb2b662e7f9714ba96befb24
                                                                                    • Instruction ID: a8c2febaadb3bcc055c7ca651fd6c4b54daabb68f8cecc3c61f9316579c5ce7f
                                                                                    • Opcode Fuzzy Hash: 1a0a37c6b97886efbc57f785da64b14554a39177fb2b662e7f9714ba96befb24
                                                                                    • Instruction Fuzzy Hash: EFC12571D00229CFDB24DFA8C841BEEBBB1BF49304F0095A9D859BB250DB749A85CF95

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 236 2b52da0-2b52e39 238 2b52e82-2b52eaa 236->238 239 2b52e3b-2b52e52 236->239 242 2b52ef0-2b52f46 238->242 243 2b52eac-2b52ec0 238->243 239->238 244 2b52e54-2b52e59 239->244 253 2b52f8c-2b5307a CreateProcessA 242->253 254 2b52f48-2b52f5c 242->254 243->242 251 2b52ec2-2b52ec7 243->251 245 2b52e7c-2b52e7f 244->245 246 2b52e5b-2b52e65 244->246 245->238 248 2b52e67 246->248 249 2b52e69-2b52e78 246->249 248->249 249->249 252 2b52e7a 249->252 255 2b52ec9-2b52ed3 251->255 256 2b52eea-2b52eed 251->256 252->245 272 2b53083-2b53168 253->272 273 2b5307c-2b53082 253->273 254->253 261 2b52f5e-2b52f63 254->261 258 2b52ed5 255->258 259 2b52ed7-2b52ee6 255->259 256->242 258->259 259->259 262 2b52ee8 259->262 263 2b52f65-2b52f6f 261->263 264 2b52f86-2b52f89 261->264 262->256 266 2b52f71 263->266 267 2b52f73-2b52f82 263->267 264->253 266->267 267->267 268 2b52f84 267->268 268->264 285 2b53178-2b5317c 272->285 286 2b5316a-2b5316e 272->286 273->272 288 2b5318c-2b53190 285->288 289 2b5317e-2b53182 285->289 286->285 287 2b53170 286->287 287->285 290 2b531a0-2b531a4 288->290 291 2b53192-2b53196 288->291 289->288 292 2b53184 289->292 294 2b531a6-2b531cf 290->294 295 2b531da-2b531e5 290->295 291->290 293 2b53198 291->293 292->288 293->290 294->295 299 2b531e6 295->299 299->299
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 02B53067
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: 4f4a5209d1b7284bb66e36e08f5683b73c86514041df29decc4af3d33592349a
                                                                                    • Instruction ID: 01a49f96051e9d934b5ad796689826886e363549c2c020045a8fc0e6bd097e79
                                                                                    • Opcode Fuzzy Hash: 4f4a5209d1b7284bb66e36e08f5683b73c86514041df29decc4af3d33592349a
                                                                                    • Instruction Fuzzy Hash: 0AC12671D002298FDB24DFA8C841BEEBBB1FF49304F0095A9D849BB240DB749A85CF95

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 300 2b52a10-2b52a83 303 2b52a85-2b52a97 300->303 304 2b52a9a-2b52afb WriteProcessMemory 300->304 303->304 306 2b52b04-2b52b56 304->306 307 2b52afd-2b52b03 304->307 307->306
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02B52AEB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: 9dbcd818ad7450732883286329848b8856a5e11844fc176bc300e0cb974f8fbb
                                                                                    • Instruction ID: 9fdff9908fc357a205bd651e5b94645ecfd379bb6b1a0dabb4773343ea9615c7
                                                                                    • Opcode Fuzzy Hash: 9dbcd818ad7450732883286329848b8856a5e11844fc176bc300e0cb974f8fbb
                                                                                    • Instruction Fuzzy Hash: AE41ABB5D012589FDF00CFA9D984ADEFBF1BB49310F14942AE818B7210C339A941CF64

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 312 2b52a18-2b52a83 314 2b52a85-2b52a97 312->314 315 2b52a9a-2b52afb WriteProcessMemory 312->315 314->315 317 2b52b04-2b52b56 315->317 318 2b52afd-2b52b03 315->318 318->317
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02B52AEB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: 0e85b0d68020cf254f1293997630e6557d2ec8badec1046f394d1b2735129050
                                                                                    • Instruction ID: 544bdc7b99935a3d1b6503b3a94374d614add3cb63b0bdff69124fdfc5a16f0b
                                                                                    • Opcode Fuzzy Hash: 0e85b0d68020cf254f1293997630e6557d2ec8badec1046f394d1b2735129050
                                                                                    • Instruction Fuzzy Hash: EA419AB5D012589FDF10CFA9D984ADEFBF1BB49310F14942AE818BB210D735AA45CF54

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 323 2b52b68-2b52c32 ReadProcessMemory 327 2b52c34-2b52c3a 323->327 328 2b52c3b-2b52c8d 323->328 327->328
                                                                                    APIs
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02B52C22
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessRead
                                                                                    • String ID:
                                                                                    • API String ID: 1726664587-0
                                                                                    • Opcode ID: 31652348f276747cbc10dbb90dd3f227f36c8f26aa1d1e8a970feebddb6d6fff
                                                                                    • Instruction ID: c466f35ce5e3fa8b7556ab4d2a8d3d8fa37dbeb6323cad6b20c5ed7250af3795
                                                                                    • Opcode Fuzzy Hash: 31652348f276747cbc10dbb90dd3f227f36c8f26aa1d1e8a970feebddb6d6fff
                                                                                    • Instruction Fuzzy Hash: 4441A9B9D00258DFCF10CFAAD981AEEFBB5BB49310F14942AE815B7210D739A945CF64

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 333 2b52b70-2b52c32 ReadProcessMemory 336 2b52c34-2b52c3a 333->336 337 2b52c3b-2b52c8d 333->337 336->337
                                                                                    APIs
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 02B52C22
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessRead
                                                                                    • String ID:
                                                                                    • API String ID: 1726664587-0
                                                                                    • Opcode ID: 98ba517b389a8069e6b67c2c9025cc73b6b7428db6335d5634d6c9b108cacec7
                                                                                    • Instruction ID: e7073ff457e73cbcbb928d2f3e238de1799931277e69acd243f69d558a9948f8
                                                                                    • Opcode Fuzzy Hash: 98ba517b389a8069e6b67c2c9025cc73b6b7428db6335d5634d6c9b108cacec7
                                                                                    • Instruction Fuzzy Hash: BD41BAB9D00258DFCF10CFAAD980AEEFBB1BB49310F14942AE815B7210C735A945CF64

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 342 2b528f0-2b529b2 VirtualAllocEx 346 2b529b4-2b529ba 342->346 347 2b529bb-2b52a05 342->347 346->347
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02B529A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: c55fcc5d4deaf095c6d753033697c8cd59ffd9e7fc98cccd5ede58ce2064338b
                                                                                    • Instruction ID: 439bd9251a0df6938db2a17da6b28d02c4a57acac1c8e5ca1599b8a94dd7a6a4
                                                                                    • Opcode Fuzzy Hash: c55fcc5d4deaf095c6d753033697c8cd59ffd9e7fc98cccd5ede58ce2064338b
                                                                                    • Instruction Fuzzy Hash: 1A3196B9D00258DBCF10CFA9D980ADEFBB5BB49310F14A42AE815BB310D735A906CF65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 352 2b528f8-2b529b2 VirtualAllocEx 355 2b529b4-2b529ba 352->355 356 2b529bb-2b52a05 352->356 355->356
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 02B529A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: ec35b1b82e31f2205a87b1ebb78f077899e8fbcb767bfb6ea687fd0b7aa30197
                                                                                    • Instruction ID: 29e5f8dcdbd7fddd567abffcf53189b7c59f8f860f1ae3afa577b73f4cb18731
                                                                                    • Opcode Fuzzy Hash: ec35b1b82e31f2205a87b1ebb78f077899e8fbcb767bfb6ea687fd0b7aa30197
                                                                                    • Instruction Fuzzy Hash: 483197B9D00258DFCF10CFA9D980A9EFBB1BB49310F10A42AE815BB310D735A901CF55

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 361 2b527c8-2b52830 364 2b52847-2b5288f Wow64SetThreadContext 361->364 365 2b52832-2b52844 361->365 367 2b52891-2b52897 364->367 368 2b52898-2b528e4 364->368 365->364 367->368
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 02B5287F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: 84c55340f5a728593e7c41a331337fb825c1c0ffd91eb6d603db60ddfb6f2ba0
                                                                                    • Instruction ID: ba33c6325242172e9fe2c9645df36b47502870d304fa4d093968b7caedab79ea
                                                                                    • Opcode Fuzzy Hash: 84c55340f5a728593e7c41a331337fb825c1c0ffd91eb6d603db60ddfb6f2ba0
                                                                                    • Instruction Fuzzy Hash: D741CCB5D012589FDB14CFAAD985ADEBBF0BF49310F14802AE814B7200C739A945CF94

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 373 2b527d0-2b52830 375 2b52847-2b5288f Wow64SetThreadContext 373->375 376 2b52832-2b52844 373->376 378 2b52891-2b52897 375->378 379 2b52898-2b528e4 375->379 376->375 378->379
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 02B5287F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: 565a629aaa358c6486dc5b3fa95061aca38a5c0db14798209872c8e4650dd45c
                                                                                    • Instruction ID: 0ed7a62c6f10c552b8c29dd6357a88199dbe6a6ed35073637dbaecb4294fdb83
                                                                                    • Opcode Fuzzy Hash: 565a629aaa358c6486dc5b3fa95061aca38a5c0db14798209872c8e4650dd45c
                                                                                    • Instruction Fuzzy Hash: 2231BBB5D012589FDB14CFAAD984AEEBBF0BF49314F14802AE818B7240C779A945CF94

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 384 2b526d8-2b5276e ResumeThread 388 2b52777-2b527b9 384->388 389 2b52770-2b52776 384->389 389->388
                                                                                    APIs
                                                                                    • ResumeThread.KERNELBASE(?), ref: 02B5275E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 522b8fbfc69b4f11bc4ac1cc5c192cd29af9b920217740a3ccfcee423d6ca9e7
                                                                                    • Instruction ID: bad40877b100d289b931307dce3a73f757b5aaaeca6d9c11221dfec823dac816
                                                                                    • Opcode Fuzzy Hash: 522b8fbfc69b4f11bc4ac1cc5c192cd29af9b920217740a3ccfcee423d6ca9e7
                                                                                    • Instruction Fuzzy Hash: 7231CBB4D012189FDB14CFAAD981ADEFBB4FB49310F14946AE815B7300C739A902CFA4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 394 2b526e0-2b5276e ResumeThread 397 2b52777-2b527b9 394->397 398 2b52770-2b52776 394->398 398->397
                                                                                    APIs
                                                                                    • ResumeThread.KERNELBASE(?), ref: 02B5275E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.1448803054.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_2b50000_holy.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 90ed2ad86f851d317cba3e23d4f9dae36316053c8852b73a62a6a85a462481e3
                                                                                    • Instruction ID: d468fa7557bbb3ab27520209f6aa7bea41c57e970b5e6993b6946230e050b9c9
                                                                                    • Opcode Fuzzy Hash: 90ed2ad86f851d317cba3e23d4f9dae36316053c8852b73a62a6a85a462481e3
                                                                                    • Instruction Fuzzy Hash: 5431AAB8D012189FDB14CFAAD981A9EFBF5FB49310F14946AE815B7300C775A901CF94

                                                                                    Execution Graph

                                                                                    Execution Coverage:15.9%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:14.3%
                                                                                    Total number of Nodes:28
                                                                                    Total number of Limit Nodes:3
                                                                                    execution_graph 9560 17346d8 9561 17346d9 9560->9561 9564 17348c9 9561->9564 9565 17348e4 9564->9565 9569 1734ef8 9565->9569 9574 1734f08 9565->9574 9566 1734713 9570 1734efc 9569->9570 9571 1734ec4 9570->9571 9579 173c168 9570->9579 9583 173c76c 9570->9583 9571->9566 9575 1734f09 9574->9575 9576 1734ff6 9575->9576 9577 173c168 LdrInitializeThunk 9575->9577 9578 173c76c 2 API calls 9575->9578 9576->9566 9577->9576 9578->9576 9580 173c17a 9579->9580 9582 173c17f 9579->9582 9580->9571 9581 173c8a9 LdrInitializeThunk 9581->9580 9582->9571 9582->9580 9582->9581 9587 173c623 9583->9587 9584 173c764 LdrInitializeThunk 9586 173c8c1 9584->9586 9586->9571 9587->9584 9588 173c168 LdrInitializeThunk 9587->9588 9588->9587 9589 173ca58 9590 173ca5f 9589->9590 9592 173ca65 9589->9592 9591 173c168 LdrInitializeThunk 9590->9591 9590->9592 9594 173cde6 9590->9594 9591->9594 9593 173c168 LdrInitializeThunk 9593->9594 9594->9592 9594->9593

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 996 173c168-173c178 997 173c17a 996->997 998 173c17f-173c18b 996->998 999 173c2ab-173c2b5 997->999 1001 173c192-173c1a7 998->1001 1002 173c18d 998->1002 1005 173c2bb-173c2fb call 1735d08 1001->1005 1006 173c1ad-173c1b8 1001->1006 1002->999 1022 173c302-173c378 call 1735d08 call 1735c00 1005->1022 1009 173c2b6 1006->1009 1010 173c1be-173c1c5 1006->1010 1009->1005 1012 173c1f2-173c1fd 1010->1012 1013 173c1c7-173c1de 1010->1013 1017 173c20a-173c214 1012->1017 1018 173c1ff-173c207 1012->1018 1013->1022 1023 173c1e4-173c1e7 1013->1023 1028 173c21a-173c224 1017->1028 1029 173c29e-173c2a3 1017->1029 1018->1017 1057 173c37a 1022->1057 1058 173c3df-173c454 call 1735ca8 1022->1058 1023->1009 1027 173c1ed-173c1f0 1023->1027 1027->1012 1027->1013 1028->1009 1033 173c22a-173c246 1028->1033 1029->999 1039 173c24a-173c24d 1033->1039 1040 173c248 1033->1040 1042 173c254-173c257 1039->1042 1043 173c24f-173c252 1039->1043 1040->999 1045 173c25a-173c268 1042->1045 1043->1045 1045->1009 1050 173c26a-173c271 1045->1050 1050->999 1051 173c273-173c279 1050->1051 1051->1009 1053 173c27b-173c280 1051->1053 1053->1009 1054 173c282-173c295 1053->1054 1054->1009 1059 173c297-173c29a 1054->1059 1061 173c381-173c384 1057->1061 1062 173c37c-173c37e 1057->1062 1069 173c4f3-173c4f9 1058->1069 1059->1051 1063 173c29c 1059->1063 1066 173c385-173c3b7 1061->1066 1065 173c380 1062->1065 1062->1066 1063->999 1065->1061 1067 173c3b9 1066->1067 1068 173c3be-173c3dc 1066->1068 1067->1068 1068->1058 1070 173c459-173c46c 1069->1070 1071 173c4ff-173c517 1069->1071 1072 173c473-173c4c4 1070->1072 1073 173c46e 1070->1073 1074 173c52b-173c53e 1071->1074 1075 173c519-173c526 1071->1075 1092 173c4d7-173c4e9 1072->1092 1093 173c4c6-173c4d4 1072->1093 1073->1072 1077 173c540 1074->1077 1078 173c545-173c561 1074->1078 1076 173c8c1-173c9bf 1075->1076 1083 173c9c1-173c9c6 call 1735ca8 1076->1083 1084 173c9c7-173c9d1 1076->1084 1077->1078 1080 173c563 1078->1080 1081 173c568-173c58c 1078->1081 1080->1081 1088 173c593-173c5c5 1081->1088 1089 173c58e 1081->1089 1083->1084 1098 173c5c7 1088->1098 1099 173c5cc-173c60e 1088->1099 1089->1088 1095 173c4f0 1092->1095 1096 173c4eb 1092->1096 1093->1071 1095->1069 1096->1095 1098->1099 1101 173c610 1099->1101 1102 173c615-173c61e 1099->1102 1101->1102 1103 173c846-173c84c 1102->1103 1104 173c623-173c648 1103->1104 1105 173c852-173c865 1103->1105 1106 173c64a 1104->1106 1107 173c64f-173c686 1104->1107 1108 173c867 1105->1108 1109 173c86c-173c887 1105->1109 1106->1107 1117 173c688 1107->1117 1118 173c68d-173c6bf 1107->1118 1108->1109 1110 173c889 1109->1110 1111 173c88e-173c8a2 1109->1111 1110->1111 1115 173c8a4 1111->1115 1116 173c8a9-173c8bf LdrInitializeThunk 1111->1116 1115->1116 1116->1076 1117->1118 1120 173c723-173c736 1118->1120 1121 173c6c1-173c6e6 1118->1121 1122 173c738 1120->1122 1123 173c73d-173c762 1120->1123 1124 173c6e8 1121->1124 1125 173c6ed-173c71b 1121->1125 1122->1123 1128 173c771-173c7a9 1123->1128 1129 173c764-173c765 1123->1129 1124->1125 1125->1120 1130 173c7b0-173c811 call 173c168 1128->1130 1131 173c7ab 1128->1131 1129->1105 1137 173c813 1130->1137 1138 173c818-173c83c 1130->1138 1131->1130 1137->1138 1141 173c843 1138->1141 1142 173c83e 1138->1142 1141->1103 1142->1141
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2694255931.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_1730000_RegAsm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 62b8a2432cc716718f7a89d43db25f9c4c9aef5b5f365565849abfdee4d20e89
                                                                                    • Instruction ID: 44561553d1656485fe8f18ba6abf1f4f9cfacc9a6f56839d52693f3687492294
                                                                                    • Opcode Fuzzy Hash: 62b8a2432cc716718f7a89d43db25f9c4c9aef5b5f365565849abfdee4d20e89
                                                                                    • Instruction Fuzzy Hash: EC222974E002198FDB15DFA8C884B9DFBB2BF88310F1481AAD409AB356DB319D85CF91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1235 173c76c 1236 173c82b-173c83c 1235->1236 1237 173c843-173c84c 1236->1237 1238 173c83e 1236->1238 1240 173c623-173c648 1237->1240 1241 173c852-173c865 1237->1241 1238->1237 1242 173c64a 1240->1242 1243 173c64f-173c686 1240->1243 1244 173c867 1241->1244 1245 173c86c-173c887 1241->1245 1242->1243 1253 173c688 1243->1253 1254 173c68d-173c6bf 1243->1254 1244->1245 1246 173c889 1245->1246 1247 173c88e-173c8a2 1245->1247 1246->1247 1251 173c8a4 1247->1251 1252 173c8a9-173c8bf LdrInitializeThunk 1247->1252 1251->1252 1255 173c8c1-173c9bf 1252->1255 1253->1254 1261 173c723-173c736 1254->1261 1262 173c6c1-173c6e6 1254->1262 1258 173c9c1-173c9c6 call 1735ca8 1255->1258 1259 173c9c7-173c9d1 1255->1259 1258->1259 1264 173c738 1261->1264 1265 173c73d-173c762 1261->1265 1266 173c6e8 1262->1266 1267 173c6ed-173c71b 1262->1267 1264->1265 1270 173c771-173c7a9 1265->1270 1271 173c764-173c765 1265->1271 1266->1267 1267->1261 1272 173c7b0-173c811 call 173c168 1270->1272 1273 173c7ab 1270->1273 1271->1241 1279 173c813 1272->1279 1280 173c818-173c82a 1272->1280 1273->1272 1279->1280 1280->1236
                                                                                    APIs
                                                                                    • LdrInitializeThunk.NTDLL(00000000), ref: 0173C8AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2694255931.0000000001730000.00000040.00000800.00020000.00000000.sdmp, Offset: 01730000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_1730000_RegAsm.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-0
                                                                                    • Opcode ID: 31ef37e7c66c0e5cb7a0c0cd42a7738e79856acda59fc0626796636c989669c6
                                                                                    • Instruction ID: 9f93e7ba916179c5014b7a15420c3ddd6e383537b2098b3426ac5b591265f29e
                                                                                    • Opcode Fuzzy Hash: 31ef37e7c66c0e5cb7a0c0cd42a7738e79856acda59fc0626796636c989669c6
                                                                                    • Instruction Fuzzy Hash: 27116A74E402098FDB19DBA8D484AEDFBB5FBC8315F14816AE944B7246D770EE41CB60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2693352982.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_155d000_RegAsm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6279fc8fb07f27c96a4746abb1786d9bbe8deef3c4124de97a2f725f1123d4b4
                                                                                    • Instruction ID: c03019185415dd1c893bb3f166139a94d3157d33d5153911379f75423154cf02
                                                                                    • Opcode Fuzzy Hash: 6279fc8fb07f27c96a4746abb1786d9bbe8deef3c4124de97a2f725f1123d4b4
                                                                                    • Instruction Fuzzy Hash: C2212572504244DFDB51DF94D990B2ABBB1FB84314F24C96EDC094F262D336D447CA62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.2693352982.000000000155D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0155D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_155d000_RegAsm.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 15854bb05083a34f833f8da36963f6296be99c0ba0ee5350f372e4fbbd1750de
                                                                                    • Instruction ID: a4eda91b66148dd783d7fb16ae40ced5f1f04a7c552854337b0b45aa559c0a12
                                                                                    • Opcode Fuzzy Hash: 15854bb05083a34f833f8da36963f6296be99c0ba0ee5350f372e4fbbd1750de
                                                                                    • Instruction Fuzzy Hash: 6311A976504280DFCB12CF54D990B19FBB1FB84218F28C6AADC494F666C33AD44ACB62