Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1443578
MD5:fb7aaa1006f70fbfa147b89f23446ed3
SHA1:203fd93ad7704755f0c6bedb050191f8aedc72cb
SHA256:ab43d9e4e22c9e9fd0ed8cf7806a074e4b89ed31b752c9e3d949bb10cd2f0794
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found pyInstaller with non standard icon
Potentially malicious time measurement code found
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7100 cmdline: "C:\Users\user\Desktop\file.exe" MD5: FB7AAA1006F70FBFA147B89F23446ED3)
    • file.exe (PID: 5804 cmdline: "C:\Users\user\Desktop\file.exe" MD5: FB7AAA1006F70FBFA147B89F23446ED3)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431CBC CRYPTO_clear_free,2_2_00007FFDA3431CBC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344E3C0 CRYPTO_THREAD_run_once,2_2_00007FFDA344E3C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431A00 CRYPTO_THREAD_read_lock,CRYPTO_THREAD_unlock,2_2_00007FFDA3431A00
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34483F0 EVP_PKEY_CTX_new,EVP_PKEY_derive_init,EVP_PKEY_derive_set_peer,EVP_PKEY_derive,CRYPTO_malloc,EVP_PKEY_derive,CRYPTO_clear_free,EVP_PKEY_CTX_free,2_2_00007FFDA34483F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3438410 CRYPTO_zalloc,ERR_put_error,2_2_00007FFDA3438410
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431E7E CRYPTO_free,CRYPTO_malloc,2_2_00007FFDA3431E7E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34842B0 CRYPTO_malloc,memcpy,2_2_00007FFDA34842B0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432293 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3432293
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344C280 CRYPTO_zalloc,ERR_put_error,CRYPTO_THREAD_lock_new,ERR_put_error,CRYPTO_free,2_2_00007FFDA344C280
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3446330 CRYPTO_free,2_2_00007FFDA3446330
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3482350 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3482350
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34562F0 ERR_put_error,CRYPTO_free,ERR_put_error,BUF_MEM_free,EVP_MD_CTX_free,X509_free,X509_VERIFY_PARAM_move_peername,CRYPTO_free,2_2_00007FFDA34562F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34313B6 CRYPTO_malloc,ERR_put_error,CRYPTO_free,CRYPTO_free,2_2_00007FFDA34313B6
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343E2E0 CRYPTO_malloc,2_2_00007FFDA343E2E0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34320FE BN_bin2bn,BN_is_zero,CRYPTO_free,CRYPTO_strdup,CRYPTO_clear_free,2_2_00007FFDA34320FE
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344E180 COMP_zlib,CRYPTO_mem_ctrl,OPENSSL_sk_new,COMP_get_type,CRYPTO_malloc,COMP_get_name,OPENSSL_sk_push,OPENSSL_sk_sort,CRYPTO_mem_ctrl,2_2_00007FFDA344E180
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431131 CRYPTO_free,2_2_00007FFDA3431131
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34461F8 CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA34461F8
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343E0B0 CRYPTO_malloc,CRYPTO_free,CRYPTO_malloc,2_2_00007FFDA343E0B0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34340BA BIO_get_data,BIO_get_init,BIO_clear_flags,BIO_set_init,CRYPTO_free,CRYPTO_zalloc,ERR_put_error,BIO_set_init,BIO_clear_flags,BIO_get_data,BIO_set_shutdown,BIO_push,BIO_set_next,BIO_up_ref,BIO_set_init,2_2_00007FFDA34340BA
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344E090 CRYPTO_mem_ctrl,OPENSSL_sk_new,COMP_get_type,CRYPTO_malloc,OPENSSL_sk_push,OPENSSL_sk_sort,CRYPTO_mem_ctrl,2_2_00007FFDA344E090
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3448130 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3448130
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343195B EVP_CIPHER_CTX_cipher,EVP_CIPHER_flags,EVP_MD_CTX_md,EVP_MD_size,CRYPTO_memcmp,EVP_MD_CTX_md,EVP_MD_CTX_md,EVP_MD_size,EVP_CIPHER_CTX_cipher,EVP_CIPHER_flags,EVP_CIPHER_CTX_cipher,EVP_CIPHER_flags,CRYPTO_memcmp,strncmp,strncmp,strncmp,strncmp,strncmp,2_2_00007FFDA343195B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432590 CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA3432590
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34680F0 CRYPTO_free,2_2_00007FFDA34680F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343222A CRYPTO_free,2_2_00007FFDA343222A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432225 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3432225
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA347883B CRYPTO_clear_free,2_2_00007FFDA347883B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3490830 CRYPTO_free,CRYPTO_strndup,CRYPTO_free,CRYPTO_memdup,OPENSSL_cleanse,2_2_00007FFDA3490830
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3470820 CRYPTO_free,CRYPTO_free,2_2_00007FFDA3470820
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA346A850 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA346A850
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431C08 CRYPTO_malloc,memset,memcpy,memcpy,CRYPTO_clear_free,CRYPTO_clear_free,CRYPTO_clear_free,CRYPTO_clear_free,OPENSSL_cleanse,2_2_00007FFDA3431C08
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343101E CRYPTO_free,CRYPTO_free,2_2_00007FFDA343101E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34346C0 BIO_get_data,BIO_get_shutdown,BIO_get_init,BIO_clear_flags,BIO_set_init,CRYPTO_free,2_2_00007FFDA34346C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343218A CONF_parse_list,ERR_put_error,CRYPTO_malloc,ERR_put_error,CRYPTO_free,CRYPTO_free,2_2_00007FFDA343218A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA348E730 OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,memcmp,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,memcpy,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,CRYPTO_memcmp,OPENSSL_sk_free,OPENSSL_sk_dup,OPENSSL_sk_free,OPENSSL_sk_dup,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA348E730
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34313FC EVP_MD_CTX_new,EVP_MD_CTX_free,CRYPTO_memcmp,memcpy,memcpy,2_2_00007FFDA34313FC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431AC8 CRYPTO_malloc,ERR_put_error,CRYPTO_free,2_2_00007FFDA3431AC8
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431050 EVP_PKEY_free,BN_num_bits,BN_bn2bin,EVP_PKEY_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,CRYPTO_clear_free,CRYPTO_clear_free,2_2_00007FFDA3431050
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431438 ERR_put_error,CRYPTO_malloc,ERR_put_error,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3431438
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431762 ERR_put_error,CRYPTO_realloc,CRYPTO_realloc,ERR_put_error,2_2_00007FFDA3431762
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34321C1 _time64,CRYPTO_free,CRYPTO_malloc,EVP_sha256,EVP_Digest,EVP_MD_size,CRYPTO_free,CRYPTO_free,2_2_00007FFDA34321C1
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431BCC CRYPTO_strdup,CRYPTO_free,2_2_00007FFDA3431BCC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA346A5E0 CRYPTO_memcmp,2_2_00007FFDA346A5E0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343236A CRYPTO_free,CRYPTO_malloc,ERR_put_error,memcpy,2_2_00007FFDA343236A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432414 CRYPTO_free,BIO_clear_flags,BIO_set_flags,BIO_snprintf,ERR_add_error_data,memcpy,2_2_00007FFDA3432414
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34322C5 CRYPTO_zalloc,CRYPTO_zalloc,OBJ_nid2sn,EVP_get_digestbyname,CRYPTO_free,CRYPTO_free,ERR_put_error,2_2_00007FFDA34322C5
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34384C0 CRYPTO_zalloc,ERR_put_error,BUF_MEM_grow,2_2_00007FFDA34384C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431F14 CRYPTO_free,2_2_00007FFDA3431F14
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3434497 CRYPTO_zalloc,ERR_put_error,BIO_set_init,BIO_set_data,BIO_clear_flags,2_2_00007FFDA3434497
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3470550 CRYPTO_memdup,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3470550
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34524E0 CRYPTO_free,CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,2_2_00007FFDA34524E0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431DD4 CRYPTO_free,CRYPTO_strndup,CRYPTO_free,OPENSSL_cleanse,_time64,memcpy,OPENSSL_cleanse,OPENSSL_cleanse,EVP_MD_size,2_2_00007FFDA3431DD4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431DA2 CRYPTO_THREAD_run_once,2_2_00007FFDA3431DA2
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343132A CRYPTO_THREAD_read_lock,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,memset,2_2_00007FFDA343132A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA345CC00 ERR_put_error,CRYPTO_realloc,CRYPTO_realloc,ERR_put_error,2_2_00007FFDA345CC00
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3470AA0 CRYPTO_memcmp,2_2_00007FFDA3470AA0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344CAC0 OPENSSL_sk_num,X509_STORE_CTX_new,ERR_put_error,OPENSSL_sk_value,X509_STORE_CTX_init,ERR_put_error,X509_STORE_CTX_free,X509_STORE_CTX_set_flags,CRYPTO_THREAD_run_once,X509_STORE_CTX_set_ex_data,OPENSSL_sk_num,X509_STORE_CTX_set0_dane,X509_STORE_CTX_set_default,X509_VERIFY_PARAM_set1,X509_STORE_CTX_set_verify_cb,X509_verify_cert,X509_STORE_CTX_get_error,OPENSSL_sk_pop_free,X509_STORE_CTX_get0_chain,X509_STORE_CTX_get1_chain,ERR_put_error,X509_VERIFY_PARAM_move_peername,X509_STORE_CTX_free,2_2_00007FFDA344CAC0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA346AA70 EVP_PKEY_get1_tls_encodedpoint,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,2_2_00007FFDA346AA70
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3464A90 CRYPTO_THREAD_write_lock,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,2_2_00007FFDA3464A90
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3490B50 EVP_PKEY_get0_RSA,RSA_size,CRYPTO_malloc,RAND_priv_bytes,CRYPTO_free,2_2_00007FFDA3490B50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431523 CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,2_2_00007FFDA3431523
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA345CB10 CRYPTO_free,CRYPTO_free,2_2_00007FFDA345CB10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431FBE CRYPTO_free,2_2_00007FFDA3431FBE
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA345C970 CRYPTO_zalloc,CRYPTO_zalloc,OBJ_nid2sn,EVP_get_digestbyname,CRYPTO_free,CRYPTO_free,ERR_put_error,2_2_00007FFDA345C970
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3480990 CRYPTO_free,CRYPTO_free,CRYPTO_strndup,2_2_00007FFDA3480990
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3438980 CRYPTO_free,2_2_00007FFDA3438980
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA348C980 CRYPTO_memcmp,2_2_00007FFDA348C980
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343221B CRYPTO_malloc,ERR_put_error,memcpy,CRYPTO_free,CRYPTO_free,2_2_00007FFDA343221B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343135C memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,2_2_00007FFDA343135C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432153 CRYPTO_free,CRYPTO_free,CRYPTO_free_ex_data,OPENSSL_LH_free,X509_STORE_free,CTLOG_STORE_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_free,user_finish,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_secure_free,CRYPTO_THREAD_lock_free,CRYPTO_free,2_2_00007FFDA3432153
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431078 CRYPTO_free,2_2_00007FFDA3431078
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA347B020 EVP_PKEY_get1_tls_encodedpoint,CRYPTO_free,EVP_PKEY_free,2_2_00007FFDA347B020
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431410 CRYPTO_malloc,ERR_put_error,BIO_snprintf,2_2_00007FFDA3431410
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA347D050 EVP_CIPHER_CTX_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA347D050
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3447008 CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA3447008
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343AEA0 CRYPTO_free,2_2_00007FFDA343AEA0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344CEC0 i2d_X509_NAME,i2d_X509_NAME,memcmp,CRYPTO_free,CRYPTO_free,2_2_00007FFDA344CEC0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3468E70 CRYPTO_zalloc,CRYPTO_free,2_2_00007FFDA3468E70
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3470E70 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3470E70
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344CE60 CRYPTO_get_ex_new_index,2_2_00007FFDA344CE60
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343157D CRYPTO_malloc,ERR_put_error,memcpy,CRYPTO_free,ERR_put_error,ERR_put_error,ERR_put_error,memcpy,2_2_00007FFDA343157D
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34324FA CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,2_2_00007FFDA34324FA
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3446F39 CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA3446F39
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431DC0 BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,CRYPTO_strdup,CRYPTO_strdup,ERR_put_error,CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,2_2_00007FFDA3431DC0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343163B CRYPTO_free,CRYPTO_malloc,2_2_00007FFDA343163B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3464EF0 CRYPTO_zalloc,ERR_put_error,_time64,CRYPTO_THREAD_lock_new,ERR_put_error,CRYPTO_free,CRYPTO_new_ex_data,CRYPTO_THREAD_lock_free,CRYPTO_THREAD_read_lock,CRYPTO_THREAD_read_lock,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,memset,CRYPTO_free_ex_data,OPENSSL_cleanse,OPENSSL_cleanse,X509_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_clear_free,memcpy,2_2_00007FFDA3464EF0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343220C ERR_put_error,ERR_put_error,ERR_put_error,CRYPTO_zalloc,CRYPTO_THREAD_lock_new,ERR_put_error,CRYPTO_free,OPENSSL_LH_new,OPENSSL_sk_num,EVP_get_digestbyname,EVP_get_digestbyname,OPENSSL_sk_new_null,OPENSSL_sk_new_null,CRYPTO_new_ex_data,RAND_bytes,RAND_priv_bytes,RAND_priv_bytes,RAND_priv_bytes,2_2_00007FFDA343220C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431393 OPENSSL_sk_new_null,d2i_X509,CRYPTO_free,OPENSSL_sk_push,CRYPTO_free,ERR_clear_error,OPENSSL_sk_value,X509_get0_pubkey,X509_free,X509_up_ref,X509_free,OPENSSL_sk_pop_free,2_2_00007FFDA3431393
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA345CDC0 ERR_put_error,ERR_put_error,ERR_put_error,EVP_MD_size,ERR_put_error,ERR_put_error,ERR_put_error,CRYPTO_zalloc,CRYPTO_malloc,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_put_error,memcpy,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_insert,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_put_error,EVP_PKEY_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,d2i_X509,X509_get0_pubkey,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,X509_free,OPENSSL_sk_new_null,OPENSSL_sk_push,ERR_put_error,X509_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_put_error,ERR_put_error,2_2_00007FFDA345CDC0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431F37 CRYPTO_free,CRYPTO_malloc,RAND_bytes,2_2_00007FFDA3431F37
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343ED90 EVP_MD_CTX_md,EVP_MD_size,CRYPTO_memcmp,EVP_MD_CTX_md,EVP_MD_CTX_md,EVP_MD_size,EVP_CIPHER_CTX_cipher,EVP_CIPHER_flags,EVP_CIPHER_CTX_cipher,EVP_CIPHER_flags,CRYPTO_memcmp,2_2_00007FFDA343ED90
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3478E3D CRYPTO_malloc,2_2_00007FFDA3478E3D
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3498E40 CRYPTO_free,CRYPTO_malloc,ERR_put_error,2_2_00007FFDA3498E40
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431B81 CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,2_2_00007FFDA3431B81
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3482E00 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,memcpy,2_2_00007FFDA3482E00
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432469 CRYPTO_malloc,memcpy,2_2_00007FFDA3432469
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34315C8 EVP_MD_CTX_new,EVP_PKEY_size,CRYPTO_malloc,EVP_DigestSignInit,RSA_pkey_ctx_ctrl,RSA_pkey_ctx_ctrl,EVP_DigestUpdate,EVP_DigestSignFinal,EVP_DigestSign,BUF_reverse,CRYPTO_free,EVP_MD_CTX_free,CRYPTO_free,EVP_MD_CTX_free,2_2_00007FFDA34315C8
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343189D CRYPTO_malloc,ERR_put_error,2_2_00007FFDA343189D
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431D61 CRYPTO_clear_free,2_2_00007FFDA3431D61
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343243C CRYPTO_malloc,ERR_put_error,memcpy,CRYPTO_free,ERR_put_error,2_2_00007FFDA343243C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431933 CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3431933
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34553A4 CRYPTO_memdup,ERR_put_error,2_2_00007FFDA34553A4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343115E OPENSSL_LH_insert,OPENSSL_LH_retrieve,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,2_2_00007FFDA343115E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432388 CRYPTO_malloc,2_2_00007FFDA3432388
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431195 CRYPTO_malloc,ERR_put_error,memcpy,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3431195
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431073 ERR_put_error,CRYPTO_THREAD_run_once,CRYPTO_THREAD_run_once,CRYPTO_THREAD_run_once,2_2_00007FFDA3431073
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432298 CRYPTO_memdup,ERR_put_error,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3432298
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34314B5 ERR_put_error,memcpy,OPENSSL_sk_num,OPENSSL_sk_num,OPENSSL_sk_new_reserve,OPENSSL_sk_value,X509_VERIFY_PARAM_get_depth,CRYPTO_dup_ex_data,X509_VERIFY_PARAM_inherit,OPENSSL_sk_dup,OPENSSL_sk_dup,2_2_00007FFDA34314B5
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432289 EVP_MD_size,EVP_CIPHER_iv_length,EVP_CIPHER_key_length,CRYPTO_clear_free,CRYPTO_malloc,2_2_00007FFDA3432289
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343177B EVP_MD_CTX_new,EVP_PKEY_new_raw_private_key,EVP_sha256,EVP_DigestSignInit,EVP_DigestSign,EVP_MD_CTX_free,EVP_PKEY_free,CRYPTO_memcmp,_time64,EVP_MD_CTX_free,EVP_PKEY_free,EVP_MD_CTX_free,EVP_PKEY_free,2_2_00007FFDA343177B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431FD2 CRYPTO_malloc,ERR_put_error,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3431FD2
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34391C0 CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA34391C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3479178 CRYPTO_free,CRYPTO_free,2_2_00007FFDA3479178
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA347B1F0 CRYPTO_malloc,EVP_DigestUpdate,EVP_MD_CTX_free,EVP_PKEY_CTX_free,EVP_PKEY_CTX_free,CRYPTO_clear_free,EVP_MD_CTX_free,2_2_00007FFDA347B1F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431E29 CRYPTO_malloc,2_2_00007FFDA3431E29
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3491060 BN_bin2bn,BN_ucmp,BN_is_zero,CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA3491060
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431479 CRYPTO_free,CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3431479
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432554 BIO_s_file,BIO_new,BIO_ctrl,strncmp,strncmp,CRYPTO_realloc,memcpy,CRYPTO_free,CRYPTO_free,CRYPTO_free,PEM_read_bio,ERR_put_error,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,BIO_free,2_2_00007FFDA3432554
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3489130 CRYPTO_memcmp,2_2_00007FFDA3489130
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3471120 CRYPTO_free,CRYPTO_strndup,2_2_00007FFDA3471120
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343230B CRYPTO_memcmp,memchr,CRYPTO_free,CRYPTO_free,CRYPTO_strndup,2_2_00007FFDA343230B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431802 CRYPTO_strdup,2_2_00007FFDA3431802
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431115 CRYPTO_zalloc,CRYPTO_free,2_2_00007FFDA3431115
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431BE0 EVP_MD_size,RAND_bytes,_time64,CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3431BE0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431A50 OPENSSL_cleanse,CRYPTO_free,CRYPTO_memdup,OPENSSL_cleanse,CRYPTO_memcmp,2_2_00007FFDA3431A50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34317BE OPENSSL_sk_new_null,d2i_X509,CRYPTO_free,CRYPTO_memcmp,OPENSSL_sk_push,OPENSSL_sk_num,CRYPTO_free,X509_free,OPENSSL_sk_pop_free,OPENSSL_sk_value,X509_get0_pubkey,X509_free,OPENSSL_sk_shift,OPENSSL_sk_pop_free,2_2_00007FFDA34317BE
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431433 CRYPTO_free,CRYPTO_strndup,2_2_00007FFDA3431433
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA348B77C CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA348B77C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431E15 ERR_put_error,CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA3431E15
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34597F0 ERR_put_error,ERR_put_error,CRYPTO_zalloc,CRYPTO_THREAD_lock_new,CRYPTO_free,ERR_put_error,OPENSSL_sk_dup,X509_VERIFY_PARAM_new,X509_VERIFY_PARAM_inherit,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_malloc,memcpy,CRYPTO_new_ex_data,2_2_00007FFDA34597F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343160E CRYPTO_THREAD_write_lock,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,2_2_00007FFDA343160E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34896D0 CRYPTO_free,CRYPTO_strndup,2_2_00007FFDA34896D0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3447690 EVP_PKEY_free,EVP_PKEY_free,CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_clear_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_clear_free,2_2_00007FFDA3447690
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431A8C memcmp,memcmp,EVP_CIPHER_CTX_free,CRYPTO_free,CRYPTO_free,memcmp,memcmp,memcpy,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3431A8C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3467680 CRYPTO_free,2_2_00007FFDA3467680
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343247D CRYPTO_malloc,memcpy,memcpy,memcmp,memcmp,memcmp,ERR_put_error,CRYPTO_clear_free,2_2_00007FFDA343247D
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34676F0 CRYPTO_free,CRYPTO_strdup,CRYPTO_free,2_2_00007FFDA34676F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431988 CRYPTO_free,CRYPTO_memdup,memcmp,CRYPTO_memdup,2_2_00007FFDA3431988
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA347B630 CRYPTO_memdup,CRYPTO_strdup,CRYPTO_free,CRYPTO_free,OPENSSL_cleanse,OPENSSL_cleanse,CRYPTO_clear_free,CRYPTO_clear_free,2_2_00007FFDA347B630
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34635F0 CRYPTO_THREAD_write_lock,OPENSSL_LH_set_down_load,CRYPTO_THREAD_unlock,2_2_00007FFDA34635F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3483610 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,memcpy,memcpy,2_2_00007FFDA3483610
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3439600 CRYPTO_malloc,ERR_put_error,CRYPTO_free,2_2_00007FFDA3439600
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34894B0 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA34894B0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431951 ERR_put_error,ASN1_item_free,memcpy,memcpy,_time64,X509_free,memcpy,CRYPTO_free,CRYPTO_free,CRYPTO_free,ASN1_item_free,2_2_00007FFDA3431951
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431929 BN_copy,BN_free,BN_dup,BN_copy,BN_free,BN_dup,BN_copy,BN_free,BN_dup,BN_copy,BN_free,CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA3431929
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34319F1 CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_memdup,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA34319F1
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34594F0 memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,2_2_00007FFDA34594F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432004 memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,memcmp,_time64,2_2_00007FFDA3432004
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431122 CRYPTO_free,2_2_00007FFDA3431122
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431069 CRYPTO_free,2_2_00007FFDA3431069
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431398 EVP_MD_CTX_new,EVP_PKEY_new,EVP_PKEY_assign,EVP_PKEY_security_bits,DH_free,EVP_PKEY_get0_DH,EVP_PKEY_free,DH_get0_key,EVP_PKEY_get1_tls_encodedpoint,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,BN_num_bits,BN_num_bits,memset,BN_num_bits,BN_bn2bin,CRYPTO_free,EVP_PKEY_size,EVP_DigestSignInit,RSA_pkey_ctx_ctrl,RSA_pkey_ctx_ctrl,CRYPTO_free,EVP_MD_CTX_free,2_2_00007FFDA3431398
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3477C50 CRYPTO_free,CRYPTO_strndup,2_2_00007FFDA3477C50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3467BF0 CRYPTO_free,2_2_00007FFDA3467BF0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3481BE0 CRYPTO_malloc,ERR_put_error,CRYPTO_malloc,ERR_put_error,CRYPTO_free,CRYPTO_zalloc,ERR_put_error,CRYPTO_free,2_2_00007FFDA3481BE0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA347DBE0 CRYPTO_free,CRYPTO_free,2_2_00007FFDA347DBE0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3467A70 CRYPTO_free,2_2_00007FFDA3467A70
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343176C CRYPTO_free,CRYPTO_malloc,memcmp,CRYPTO_memdup,2_2_00007FFDA343176C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343129E CRYPTO_THREAD_run_once,2_2_00007FFDA343129E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431163 EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3431163
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431A0A CRYPTO_zalloc,memcpy,memcpy,memcpy,memcpy,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3431A0A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA346FAE0 CRYPTO_realloc,2_2_00007FFDA346FAE0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34779C0 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA34779C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34639C0 CRYPTO_free_ex_data,OPENSSL_cleanse,OPENSSL_cleanse,X509_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_clear_free,2_2_00007FFDA34639C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34310FF CRYPTO_zalloc,ERR_put_error,ERR_put_error,CRYPTO_free,EVP_PKEY_up_ref,X509_up_ref,EVP_PKEY_up_ref,X509_chain_up_ref,CRYPTO_malloc,memcpy,CRYPTO_malloc,memcpy,ERR_put_error,EVP_PKEY_free,X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,X509_STORE_free,X509_STORE_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_free,CRYPTO_malloc,memcpy,CRYPTO_memdup,X509_STORE_up_ref,X509_STORE_up_ref,CRYPTO_strdup,2_2_00007FFDA34310FF
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA349D990 BN_num_bits,CRYPTO_malloc,BN_bn2bin,BN_clear_free,BN_clear_free,CRYPTO_clear_free,BN_clear_free,BN_clear_free,BN_clear_free,2_2_00007FFDA349D990
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3489990 CRYPTO_malloc,EVP_CIPHER_CTX_new,CRYPTO_free,EVP_CIPHER_CTX_free,HMAC_CTX_free,CRYPTO_free,EVP_CIPHER_CTX_free,HMAC_CTX_free,EVP_CIPHER_CTX_iv_length,EVP_CIPHER_iv_length,RAND_bytes,EVP_sha256,EVP_EncryptUpdate,EVP_EncryptFinal,HMAC_Update,HMAC_Final,2_2_00007FFDA3489990
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432063 EVP_PKEY_get1_tls_encodedpoint,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,2_2_00007FFDA3432063
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34318DE CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,2_2_00007FFDA34318DE
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3437A50 CRYPTO_free,2_2_00007FFDA3437A50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA345FA54 CRYPTO_free,EVP_PKEY_free,CRYPTO_free,2_2_00007FFDA345FA54
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34316F4 CRYPTO_malloc,CRYPTO_THREAD_lock_new,X509_up_ref,X509_chain_up_ref,CRYPTO_strdup,CRYPTO_strdup,CRYPTO_dup_ex_data,CRYPTO_strdup,CRYPTO_memdup,ERR_put_error,CRYPTO_memdup,CRYPTO_strdup,CRYPTO_memdup,2_2_00007FFDA34316F4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3457A10 X509_VERIFY_PARAM_free,CRYPTO_free_ex_data,BIO_pop,BIO_free,BIO_free_all,BIO_free_all,BUF_MEM_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,SCT_LIST_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,EVP_MD_CTX_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,ASYNC_WAIT_CTX_free,CRYPTO_free,OPENSSL_sk_free,CRYPTO_THREAD_lock_free,CRYPTO_free,2_2_00007FFDA3457A10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA347BA00 X509_get0_pubkey,CRYPTO_malloc,RAND_bytes,EVP_PKEY_CTX_new,EVP_PKEY_encrypt_init,EVP_PKEY_encrypt,EVP_PKEY_encrypt,EVP_PKEY_CTX_free,CRYPTO_clear_free,EVP_PKEY_CTX_free,2_2_00007FFDA347BA00
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3455A07 CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,2_2_00007FFDA3455A07
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431235 X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,2_2_00007FFDA3431235
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431DCF CRYPTO_malloc,CRYPTO_mem_ctrl,OPENSSL_sk_find,CRYPTO_free,CRYPTO_mem_ctrl,ERR_put_error,OPENSSL_sk_push,CRYPTO_mem_ctrl,CRYPTO_free,CRYPTO_mem_ctrl,ERR_put_error,2_2_00007FFDA3431DCF
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343DFA0 CRYPTO_free,2_2_00007FFDA343DFA0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34311B3 EVP_PKEY_free,X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,X509_STORE_free,X509_STORE_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_free,2_2_00007FFDA34311B3
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431C99 HMAC_CTX_new,EVP_CIPHER_CTX_new,EVP_sha256,HMAC_Init_ex,EVP_aes_256_cbc,HMAC_size,EVP_CIPHER_CTX_iv_length,HMAC_Update,HMAC_Final,CRYPTO_memcmp,EVP_CIPHER_CTX_iv_length,EVP_CIPHER_CTX_iv_length,CRYPTO_malloc,CRYPTO_free,CRYPTO_free,memcpy,ERR_clear_error,CRYPTO_free,EVP_CIPHER_CTX_free,HMAC_CTX_free,2_2_00007FFDA3431C99
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34310F5 EVP_PKEY_free,CRYPTO_free,CRYPTO_free,EVP_MD_CTX_new,RSA_pkey_ctx_ctrl,CRYPTO_free,EVP_MD_CTX_free,EVP_MD_CTX_free,2_2_00007FFDA34310F5
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34320B8 CRYPTO_free,CRYPTO_malloc,memcpy,2_2_00007FFDA34320B8
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431C8F CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3431C8F
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34314FB EVP_PKEY_get1_tls_encodedpoint,EVP_PKEY_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,2_2_00007FFDA34314FB
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34316F9 CRYPTO_free,2_2_00007FFDA34316F9
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344A000 CRYPTO_free,CRYPTO_strndup,2_2_00007FFDA344A000
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34315E6 EVP_MD_CTX_new,X509_get0_pubkey,EVP_PKEY_id,EVP_PKEY_id,EVP_PKEY_id,EVP_PKEY_size,EVP_DigestVerifyInit,CRYPTO_malloc,BUF_reverse,RSA_pkey_ctx_ctrl,RSA_pkey_ctx_ctrl,EVP_DigestUpdate,EVP_MD_CTX_ctrl,EVP_DigestVerify,BIO_free,EVP_MD_CTX_free,CRYPTO_free,2_2_00007FFDA34315E6
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432022 EVP_CIPHER_key_length,EVP_CIPHER_iv_length,CRYPTO_malloc,2_2_00007FFDA3432022
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3463EC0 CRYPTO_zalloc,ERR_put_error,_time64,CRYPTO_THREAD_lock_new,ERR_put_error,CRYPTO_new_ex_data,CRYPTO_THREAD_lock_free,CRYPTO_free,2_2_00007FFDA3463EC0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432527 ERR_put_error,CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA3432527
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3481F50 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3481F50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343DEF0 CRYPTO_free,2_2_00007FFDA343DEF0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344FF10 strncmp,strncmp,strncmp,strncmp,ERR_put_error,CRYPTO_malloc,CRYPTO_malloc,CRYPTO_free,ERR_put_error,strncmp,CRYPTO_free,OPENSSL_sk_new_null,CRYPTO_free,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_push,OPENSSL_sk_num,OPENSSL_sk_push,CRYPTO_free,OPENSSL_sk_free,CRYPTO_free,OPENSSL_sk_free,2_2_00007FFDA344FF10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3445DB0 CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_clear_free,CRYPTO_free,CRYPTO_free,EVP_PKEY_free,EVP_PKEY_free,CRYPTO_free,CRYPTO_free,memset,CRYPTO_free,2_2_00007FFDA3445DB0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431979 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3431979
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34316D1 CRYPTO_zalloc,ERR_put_error,2_2_00007FFDA34316D1
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34323BF CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA34323BF
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3453D60 CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3453D60
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343102D CRYPTO_malloc,COMP_expand_block,2_2_00007FFDA343102D
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA347BD80 BN_num_bits,BN_bn2bin,CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA347BD80
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3467E50 CRYPTO_free,2_2_00007FFDA3467E50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3439E40 CRYPTO_malloc,memset,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA3439E40
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3467DE0 CRYPTO_free,2_2_00007FFDA3467DE0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34311EA CRYPTO_zalloc,ERR_put_error,BUF_MEM_grow,CRYPTO_free,2_2_00007FFDA34311EA
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431FF5 CRYPTO_free,CRYPTO_malloc,CRYPTO_free,CRYPTO_free,CRYPTO_memdup,2_2_00007FFDA3431FF5
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431348 CRYPTO_zalloc,ERR_put_error,2_2_00007FFDA3431348
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA349DCA0 SRP_Calc_u,BN_num_bits,CRYPTO_malloc,BN_bn2bin,BN_clear_free,BN_clear_free,2_2_00007FFDA349DCA0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344FCC0 CRYPTO_zalloc,ERR_put_error,CRYPTO_free,2_2_00007FFDA344FCC0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431A69 CRYPTO_free,2_2_00007FFDA3431A69
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3451C60 CRYPTO_free,CRYPTO_strdup,2_2_00007FFDA3451C60
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3467C90 CRYPTO_free,CRYPTO_free,2_2_00007FFDA3467C90
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3447D30 CRYPTO_zalloc,2_2_00007FFDA3447D30
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA346FD10 CRYPTO_malloc,CRYPTO_malloc,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FFDA346FD10
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: file.exe, 00000000.00000003.2091571829.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2123640277.00007FFD942E0000.00000002.00000001.01000000.00000011.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs source: _rust.pyd.0.dr
Source: Binary string: C:\Users\runneradmin\AppData\Local\Temp\pip-req-build-qj8bun1p\src\_bcrypt\target\release\deps\bcrypt_rust.pdb source: _bcrypt.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb@@ source: file.exe, 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmp, libssl-1_1.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: _rust.pyd.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: file.exe, 00000002.00000002.2126503167.00007FFDA372F000.00000002.00000001.01000000.0000000A.sdmp, libcrypto-1_1.dll.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1u 30 May 2023built on: Wed May 31 23:27:41 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-1_1"not available source: file.exe, 00000002.00000002.2126503167.00007FFDA372F000.00000002.00000001.01000000.0000000A.sdmp, libcrypto-1_1.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: file.exe, 00000000.00000003.2077987715.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2128068524.00007FFDAC061000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: file.exe, 00000000.00000003.2077987715.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2128068524.00007FFDAC061000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\libcrypto-1_1.pdb source: file.exe, 00000002.00000002.2126503167.00007FFDA37B1000.00000002.00000001.01000000.0000000A.sdmp, libcrypto-1_1.dll.0.dr
Source: Binary string: C:\Users\runneradmin\AppData\Local\Temp\pip-req-build-qj8bun1p\src\_bcrypt\target\release\deps\bcrypt_rust.pdbR source: _bcrypt.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: file.exe, 00000002.00000002.2124080160.00007FFD9466B000.00000002.00000001.01000000.00000004.sdmp, python311.dll.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb source: file.exe, 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmp, libssl-1_1.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: file.exe, 00000000.00000003.2089487815.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127931710.00007FFDA57F3000.00000002.00000001.01000000.00000008.sdmp, select.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb$$ source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: file.exe, 00000000.00000003.2078659802.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127682349.00007FFDA54E7000.00000002.00000001.01000000.0000000D.sdmp, _hashlib.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2125620415.00007FFDA338C000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: crypto\stack\stack.cOPENSSL_sk_dupOPENSSL_sk_deep_copysk_reserveOPENSSL_sk_new_reserveOPENSSL_sk_reserveOPENSSL_sk_insertOPENSSL_sk_seti=%dcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC3.1.4built on: Fri Nov 24 00:12:45 2023 UTCplatform: VC-WIN64AOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availablecrypto\init.cOPENSSL_init_cryptoOPENSSL_atexitcrypto\bio\bio_lib.cBIO_new_exbio_read_internbio_write_internBIO_putsBIO_getsBIO_get_line BIO_ctrlBIO_callback_ctrlBIO_find_type source: _rust.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: file.exe, 00000000.00000003.2078946153.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127421041.00007FFDA54C3000.00000002.00000001.01000000.0000000E.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2125620415.00007FFDA338C000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: file.exe, 00000000.00000003.2078144390.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127143410.00007FFDA546D000.00000002.00000001.01000000.00000012.sdmp
Source: Binary string: X509_SIGPKCS8_encrypt_excrypto\pkcs12\p12_p8e.cPKCS8_set0_pbe_excompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs source: _rust.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: file.exe, 00000000.00000003.2079040953.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127817019.00007FFDA5508000.00000002.00000001.01000000.00000007.sdmp, _socket.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: file.exe, 00000000.00000003.2087046471.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2119063937.00000239C2C10000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: file.exe, 00000002.00000002.2126938285.00007FFDA46ED000.00000002.00000001.01000000.00000009.sdmp, _ssl.pyd.0.dr
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A108D00 FindFirstFileExW,FindClose,0_2_00007FF75A108D00
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A118670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF75A118670
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A118670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF75A118670
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1226C4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF75A1226C4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E322E _errno,malloc,_errno,memset,MultiByteToWideChar,GetLastError,MultiByteToWideChar,MultiByteToWideChar,free,_errno,FindFirstFileW,_errno,FindNextFileW,WideCharToMultiByte,2_2_00007FFDA34E322E
Source: file.exe, 00000002.00000003.2104835722.00000239C38B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2122964981.00000239C3C40000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104716566.00000239C3222000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://.../back.jpeg
Source: file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
Source: file.exe, python311.dll.0.dr, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: file.exe, 00000000.00000003.2078659802.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091542556.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079040953.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087798746.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085524874.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078144390.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079202900.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078435707.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091571829.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087840593.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078946153.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085460991.000002181B340000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086749324.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087046471.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089551898.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086703998.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089487815.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, python311.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: file.exe, python311.dll.0.dr, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: file.exe, python311.dll.0.dr, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: file.exe, 00000000.00000003.2087073718.000002181B335000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crPyObject_CheckReadBufferpython311.PyObject_CheckReadBufferPyObject_ClearWeakRefspython311.P
Source: file.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: file.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: file.exe, python311.dll.0.dr, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: file.exe, 00000000.00000003.2078659802.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091542556.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079040953.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087798746.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085524874.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078144390.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079202900.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078435707.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091571829.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087840593.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078946153.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085460991.000002181B340000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086749324.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087046471.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089551898.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086703998.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089487815.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, python311.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: file.exe, python311.dll.0.dr, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: libcrypto-1_1.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: file.exe, 00000000.00000003.2078659802.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091542556.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079040953.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087798746.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085524874.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078144390.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079202900.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078435707.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091571829.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087840593.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078946153.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085460991.000002181B340000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086749324.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087046471.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089551898.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086703998.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089487815.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, python311.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: file.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: file.exe, 00000002.00000003.2104251717.00000239C390B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2122330234.00000239C3740000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103420247.00000239C390B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://curl.haxx.se/rfc/cookie_spec.html
Source: file.exe, 00000002.00000003.2107470310.00000239C3421000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2110567806.00000239C3450000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107232156.00000239C340E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2110906844.00000239C3453000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C3443000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111082663.00000239C3464000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/
Source: file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108987087.00000239C34A5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121639639.00000239C34AD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C348F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/mail/
Source: file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121613410.00000239C349F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109093292.00000239C3499000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C348F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d5937
Source: file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121613410.00000239C349F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107470310.00000239C3421000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107232156.00000239C340E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109567235.00000239C3466000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109093292.00000239C3499000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C3443000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
Source: file.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: file.exe, 00000000.00000003.2078659802.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091542556.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079040953.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087798746.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085524874.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078144390.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079202900.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078435707.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091571829.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087840593.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078946153.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085460991.000002181B340000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086749324.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087046471.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089551898.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086703998.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089487815.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, python311.dll.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: file.exe, python311.dll.0.dr, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: file.exe, python311.dll.0.dr, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: file.exe, python311.dll.0.dr, select.pyd.0.dr, _decimal.pyd.0.dr, _socket.pyd.0.dr, _ssl.pyd.0.dr, _hashlib.pyd.0.dr, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: file.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: file.exe, 00000002.00000002.2122964981.00000239C3C40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
Source: file.exe, 00000002.00000003.2101618066.00000239C3480000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101768333.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102150171.00000239C3450000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html
Source: file.exe, 00000000.00000003.2078659802.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091542556.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079040953.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087798746.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085524874.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078144390.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2079202900.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078435707.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2091571829.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087840593.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078946153.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2085460991.000002181B340000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086749324.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087046471.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089551898.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2086703998.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2087073718.000002181B342000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2089487815.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, python311.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: file.exe, 00000002.00000003.2106591896.00000239C3503000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109975810.00000239C3509000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
Source: file.exe, 00000002.00000003.2101768333.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102150171.00000239C3450000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html
Source: file.exe, 00000002.00000003.2101618066.00000239C3480000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101768333.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102150171.00000239C3450000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
Source: file.exe, 00000002.00000003.2107073018.00000239C31CA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104251717.00000239C390B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106513414.00000239C31BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111330977.00000239C31CB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103420247.00000239C390B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wwwsearch.sf.net/):
Source: file.exe, 00000002.00000003.2111125283.00000239C33B8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101768333.00000239C33C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33B5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101360000.00000239C33B6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100755088.00000239C3456000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100212085.00000239C3456000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2110269188.00000239C33B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111817225.00000239C33B8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120983564.00000239C33B8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102208957.00000239C33C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bugs.python.org/issue42195.
Source: _cffi_backend.cp311-win_amd64.pyd.0.drString found in binary or memory: https://cffi.readthedocs.io/en/latest/using.html#callbacks
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://cryptography.io
Source: METADATA.0.drString found in binary or memory: https://cryptography.io/
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://cryptography.io/en/latest/changelog/
Source: _rust.pyd.0.drString found in binary or memory: https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://cryptography.io/en/latest/installation/
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://cryptography.io/en/latest/security/
Source: file.exe, 00000002.00000003.2102374817.00000239C3462000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107470310.00000239C3421000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101360000.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107232156.00000239C340E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109567235.00000239C3466000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101535138.00000239C3461000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C3443000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101688059.00000239C346D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102486918.00000239C346C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2110151704.00000239C346D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102150171.00000239C3450000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
Source: _bcrypt.pyd.0.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
Source: file.exe, 00000002.00000002.2122202015.00000239C3640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://foss.heptapod.net/pypy/pypy/-/issues/3539
Source: file.exe, 00000002.00000003.2111970200.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111255514.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Ousret/charset_normalizer
Source: file.exe, 00000002.00000003.2099430534.00000239C13FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2096439344.00000239C3141000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106855895.00000239C13DB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2114317566.00000239C1413000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099518287.00000239C1401000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2118572303.00000239C1414000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107882981.00000239C1406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099123421.00000239C1405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099804414.00000239C13F5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109428688.00000239C1410000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098285001.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100696562.00000239C13FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108940623.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098766089.00000239C13F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
Source: _bcrypt.pyd.0.drString found in binary or memory: https://github.com/pyca/bcrypt/__version_ex__4.1.2The
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography/
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography/actions?query=workflow%3ACI
Source: METADATA.0.dr, _rust.pyd.0.drString found in binary or memory: https://github.com/pyca/cryptography/issues
Source: _rust.pyd.0.drString found in binary or memory: https://github.com/pyca/cryptography/issues/8996
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main
Source: file.exe, 00000002.00000003.2096439344.00000239C3141000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2119286783.00000239C2D88000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
Source: file.exe, 00000002.00000003.2098766089.00000239C13F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
Source: file.exe, 00000002.00000003.2099430534.00000239C13FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2096439344.00000239C3141000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106855895.00000239C13DB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2114317566.00000239C1413000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099518287.00000239C1401000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2118572303.00000239C1414000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107882981.00000239C1406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099123421.00000239C1405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099804414.00000239C13F5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109428688.00000239C1410000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098285001.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100696562.00000239C13FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108940623.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098766089.00000239C13F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
Source: file.exe, 00000002.00000003.2099430534.00000239C13FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2096439344.00000239C3141000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106855895.00000239C13DB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2114317566.00000239C1413000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099518287.00000239C1401000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2118572303.00000239C1414000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107882981.00000239C1406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099123421.00000239C1405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099804414.00000239C13F5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109428688.00000239C1410000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098285001.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100696562.00000239C13FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108940623.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098766089.00000239C13F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
Source: file.exe, 00000002.00000002.2122202015.00000239C3640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
Source: file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121613410.00000239C349F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109093292.00000239C3499000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C348F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
Source: file.exe, 00000002.00000002.2122202015.00000239C3640000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920
Source: file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/
Source: file.exe, 00000002.00000003.2106627313.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106610803.00000239C3518000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107583289.00000239C351E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106494916.00000239C350C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108495608.00000239C34FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail
Source: file.exe, 00000002.00000003.2109498206.00000239C3473000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail/
Source: file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111373792.00000239C34E1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107907520.00000239C34D0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108987087.00000239C34D5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html.spec.whatwg.org/multipage/
Source: file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/
Source: file.exe, 00000002.00000003.2116021706.00000239C3E28000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120126103.00000239C3221000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2105710336.00000239C3524000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2105814384.00000239C38FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107583289.00000239C3528000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108695923.00000239C3528000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106348484.00000239C3528000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106141104.00000239C31D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/get
Source: file.exe, 00000002.00000003.2108047474.00000239C31BF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2115650014.00000239C31C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106513414.00000239C31BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108451542.00000239C31C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120001108.00000239C31C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/post
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://img.shields.io/pypi/v/cryptography.svg
Source: file.exe, 00000002.00000003.2116021706.00000239C3DF8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy
Source: file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111772823.00000239C34DD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111970200.00000239C34DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://json.org
Source: file.exe, 00000002.00000003.2105471619.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104835722.00000239C38B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104765849.00000239C3908000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2122509155.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106826126.00000239C3920000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106070756.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107422942.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106437603.00000239C3901000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104835722.00000239C38E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2105814384.00000239C38FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106796381.00000239C3916000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107342561.00000239C3926000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104325449.00000239C38CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mahler:8092/site-updates.py
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://mail.python.org/mailman/listinfo/cryptography-dev
Source: file.exe, 00000002.00000002.2120171366.00000239C3240000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drString found in binary or memory: https://peps.python.org/pep-0205/
Source: file.exe, 00000002.00000002.2124080160.00007FFD9466B000.00000002.00000001.01000000.00000004.sdmp, python311.dll.0.drString found in binary or memory: https://peps.python.org/pep-0263/
Source: file.exe, 00000002.00000002.2119644866.00000239C2F40000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pluvinecollutstogie.sbs/id777
Source: file.exe, 00000002.00000002.2119644866.00000239C2F40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://pluvinecollutstogie.sbs/id777index
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://pypi.org/project/cryptography/
Source: file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drString found in binary or memory: https://readthedocs.org/projects/cryptography/badge/?version=latest
Source: file.exe, 00000002.00000003.2108047474.00000239C31BF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2115650014.00000239C31C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2116021706.00000239C3DF8000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106513414.00000239C31BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108451542.00000239C31C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120001108.00000239C31C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://requests.readthedocs.io
Source: file.exeString found in binary or memory: https://sectigo.com/CPS0
Source: file.exe, 00000002.00000003.2107697642.00000239C31A3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2114474082.00000239C31A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc2388#section-4.4
Source: file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
Source: file.exe, 00000002.00000002.2122330234.00000239C3740000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
Source: file.exe, 00000002.00000002.2122330234.00000239C3740000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
Source: file.exe, 00000000.00000003.2081387871.000002181B335000.00000004.00000020.00020000.00000000.sdmp, LICENSE.APACHE.0.drString found in binary or memory: https://www.apache.org/licenses/
Source: file.exe, 00000000.00000003.2081956102.000002181B343000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081387871.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081346972.000002181B343000.00000004.00000020.00020000.00000000.sdmp, LICENSE.APACHE.0.drString found in binary or memory: https://www.apache.org/licenses/LICENSE-2.0
Source: file.exe, 00000000.00000003.2086703998.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmp, file.exe, 00000002.00000002.2126709512.00007FFDA3828000.00000002.00000001.01000000.0000000A.sdmp, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drString found in binary or memory: https://www.openssl.org/H
Source: file.exe, 00000002.00000003.2108047474.00000239C31BF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2115650014.00000239C31C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106513414.00000239C31BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108451542.00000239C31C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120001108.00000239C31C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org
Source: file.exe, 00000002.00000003.2105471619.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104835722.00000239C38B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104765849.00000239C3908000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2122509155.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106826126.00000239C3920000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106070756.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107422942.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106437603.00000239C3901000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104835722.00000239C38E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2105814384.00000239C38FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106796381.00000239C3916000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107342561.00000239C3926000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104325449.00000239C38CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/
Source: file.exe, 00000002.00000002.2119286783.00000239C2D00000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098027317.00000239C31A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098073514.00000239C3184000.00000004.00000020.00020000.00000000.sdmp, base_library.zip.0.drString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
Source: file.exe, 00000002.00000002.2124395084.00007FFD94708000.00000004.00000001.01000000.00000004.sdmp, python311.dll.0.drString found in binary or memory: https://www.python.org/psf/license/
Source: file.exe, 00000002.00000003.2106627313.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106610803.00000239C3518000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107583289.00000239C351E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106494916.00000239C350C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108495608.00000239C34FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A126B500_2_00007FF75A126B50
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A107B600_2_00007FF75A107B60
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A127A9C0_2_00007FF75A127A9C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1010000_2_00007FF75A101000
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A109D9B0_2_00007FF75A109D9B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1186700_2_00007FF75A118670
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A11F3200_2_00007FF75A11F320
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A11AC500_2_00007FF75A11AC50
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1124800_2_00007FF75A112480
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1184BC0_2_00007FF75A1184BC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A11ECA00_2_00007FF75A11ECA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1217200_2_00007FF75A121720
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A112A940_2_00007FF75A112A94
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A124A600_2_00007FF75A124A60
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1122740_2_00007FF75A112274
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1092D00_2_00007FF75A1092D0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1142D40_2_00007FF75A1142D4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A109F3B0_2_00007FF75A109F3B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1167500_2_00007FF75A116750
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1217200_2_00007FF75A121720
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A10A76D0_2_00007FF75A10A76D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1186700_2_00007FF75A118670
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A11E80C0_2_00007FF75A11E80C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A12A7D80_2_00007FF75A12A7D8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1128900_2_00007FF75A112890
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1120700_2_00007FF75A112070
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1135400_2_00007FF75A113540
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1275500_2_00007FF75A127550
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A126DCC0_2_00007FF75A126DCC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1126840_2_00007FF75A112684
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1226C40_2_00007FF75A1226C4
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A113ED00_2_00007FF75A113ED0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A124EFC0_2_00007FF75A124EFC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A118EF40_2_00007FF75A118EF4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFD941D18A02_2_00007FFD941D18A0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33753A02_2_00007FFDA33753A0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3371BB02_2_00007FFDA3371BB0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3372FF02_2_00007FFDA3372FF0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA337F81C2_2_00007FFDA337F81C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3376EAC2_2_00007FFDA3376EAC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33712B02_2_00007FFDA33712B0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33725302_2_00007FFDA3372530
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3378D402_2_00007FFDA3378D40
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3375CE02_2_00007FFDA3375CE0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33E53B02_2_00007FFDA33E53B0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33A47C02_2_00007FFDA33A47C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BEBD02_2_00007FFDA33BEBD0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33C1F602_2_00007FFDA33C1F60
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33C2F902_2_00007FFDA33C2F90
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33B4B902_2_00007FFDA33B4B90
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BC0202_2_00007FFDA33BC020
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BD4302_2_00007FFDA33BD430
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BAC402_2_00007FFDA33BAC40
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33AD7F02_2_00007FFDA33AD7F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33A8C102_2_00007FFDA33A8C10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BB2C02_2_00007FFDA33BB2C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BC6D02_2_00007FFDA33BC6D0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33C2A702_2_00007FFDA33C2A70
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33A13502_2_00007FFDA33A1350
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33B66F02_2_00007FFDA33B66F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33B9B102_2_00007FFDA33B9B10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BDB102_2_00007FFDA33BDB10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BFF102_2_00007FFDA33BFF10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33B5DD02_2_00007FFDA33B5DD0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BB9702_2_00007FFDA33BB970
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BF5702_2_00007FFDA33BF570
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33A32402_2_00007FFDA33A3240
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BE2502_2_00007FFDA33BE250
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33C3A502_2_00007FFDA33C3A50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33A3A002_2_00007FFDA33A3A00
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33B54B02_2_00007FFDA33B54B0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33C34C02_2_00007FFDA33C34C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33AC0702_2_00007FFDA33AC070
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33A41402_2_00007FFDA33A4140
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33BCD502_2_00007FFDA33BCD50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33AC5502_2_00007FFDA33AC550
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33A1CE02_2_00007FFDA33A1CE0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33C08F02_2_00007FFDA33C08F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34802402_2_00007FFDA3480240
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343195B2_2_00007FFDA343195B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34325722_2_00007FFDA3432572
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34984602_2_00007FFDA3498460
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431DD42_2_00007FFDA3431DD4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3436BA02_2_00007FFDA3436BA0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34315372_2_00007FFDA3431537
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3490B502_2_00007FFDA3490B50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34320B32_2_00007FFDA34320B3
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343168B2_2_00007FFDA343168B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343B3602_2_00007FFDA343B360
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343115E2_2_00007FFDA343115E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34412F02_2_00007FFDA34412F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34315B42_2_00007FFDA34315B4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431BE02_2_00007FFDA3431BE0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34317BE2_2_00007FFDA34317BE
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA344F6602_2_00007FFDA344F660
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431A8C2_2_00007FFDA3431A8C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34313982_2_00007FFDA3431398
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343114F2_2_00007FFDA343114F
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34314512_2_00007FFDA3431451
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343F9C52_2_00007FFDA343F9C5
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34313F22_2_00007FFDA34313F2
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3431C992_2_00007FFDA3431C99
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA343199C2_2_00007FFDA343199C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36163602_2_00007FFDA3616360
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E1A4B2_2_00007FFDA34E1A4B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E57D62_2_00007FFDA34E57D6
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E435E2_2_00007FFDA34E435E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E37922_2_00007FFDA34E3792
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E1B312_2_00007FFDA34E1B31
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E474B2_2_00007FFDA34E474B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E2D102_2_00007FFDA34E2D10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36160602_2_00007FFDA3616060
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E707C2_2_00007FFDA34E707C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E6FFF2_2_00007FFDA34E6FFF
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E36982_2_00007FFDA34E3698
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E348B2_2_00007FFDA34E348B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E1B222_2_00007FFDA34E1B22
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E60DC2_2_00007FFDA34E60DC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E4D092_2_00007FFDA34E4D09
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5DA32_2_00007FFDA34E5DA3
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5E252_2_00007FFDA34E5E25
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E4E532_2_00007FFDA34E4E53
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36128A02_2_00007FFDA36128A0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5A652_2_00007FFDA34E5A65
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA366E9202_2_00007FFDA366E920
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E23F12_2_00007FFDA34E23F1
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E1CC12_2_00007FFDA34E1CC1
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E72C52_2_00007FFDA34E72C5
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5B142_2_00007FFDA34E5B14
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34FEF002_2_00007FFDA34FEF00
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA35C2C902_2_00007FFDA35C2C90
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3682D502_2_00007FFDA3682D50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E29D22_2_00007FFDA34E29D2
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA350B1C02_2_00007FFDA350B1C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E114F2_2_00007FFDA34E114F
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E46382_2_00007FFDA34E4638
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E6EF12_2_00007FFDA34E6EF1
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA361B2402_2_00007FFDA361B240
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34FF2002_2_00007FFDA34FF200
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34FF0602_2_00007FFDA34FF060
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E213F2_2_00007FFDA34E213F
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E1EA12_2_00007FFDA34E1EA1
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA354F7002_2_00007FFDA354F700
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E516E2_2_00007FFDA34E516E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E3B982_2_00007FFDA34E3B98
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E6CBC2_2_00007FFDA34E6CBC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA350B5502_2_00007FFDA350B550
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36175402_2_00007FFDA3617540
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5D8A2_2_00007FFDA34E5D8A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E655F2_2_00007FFDA34E655F
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E3FDF2_2_00007FFDA34E3FDF
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E6A872_2_00007FFDA34E6A87
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA371FA702_2_00007FFDA371FA70
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E21B72_2_00007FFDA34E21B7
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E6F282_2_00007FFDA34E6F28
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E416A2_2_00007FFDA34E416A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E22E82_2_00007FFDA34E22E8
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E60A02_2_00007FFDA34E60A0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E704A2_2_00007FFDA34E704A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E22892_2_00007FFDA34E2289
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34FBF202_2_00007FFDA34FBF20
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34FBD602_2_00007FFDA34FBD60
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E30C62_2_00007FFDA34E30C6
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3683C902_2_00007FFDA3683C90
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3617D102_2_00007FFDA3617D10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3697CF02_2_00007FFDA3697CF0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA35904402_2_00007FFDA3590440
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E14242_2_00007FFDA34E1424
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E2E912_2_00007FFDA34E2E91
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E4C3C2_2_00007FFDA34E4C3C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E2C7A2_2_00007FFDA34E2C7A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36203402_2_00007FFDA3620340
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E276B2_2_00007FFDA34E276B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E41062_2_00007FFDA34E4106
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36100702_2_00007FFDA3610070
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E32EC2_2_00007FFDA34E32EC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5B782_2_00007FFDA34E5B78
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E6C212_2_00007FFDA34E6C21
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA360C8302_2_00007FFDA360C830
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E4B5B2_2_00007FFDA34E4B5B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36985C02_2_00007FFDA36985C0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E25F42_2_00007FFDA34E25F4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E177B2_2_00007FFDA34E177B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34FC6202_2_00007FFDA34FC620
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34FC4802_2_00007FFDA34FC480
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E69E72_2_00007FFDA34E69E7
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E27612_2_00007FFDA34E2761
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E59342_2_00007FFDA34E5934
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E2FD12_2_00007FFDA34E2FD1
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E11CC2_2_00007FFDA34E11CC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E4C192_2_00007FFDA34E4C19
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E22AC2_2_00007FFDA34E22AC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E4A592_2_00007FFDA34E4A59
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E2D792_2_00007FFDA34E2D79
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E36342_2_00007FFDA34E3634
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E6EBF2_2_00007FFDA34E6EBF
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E22FC2_2_00007FFDA34E22FC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E1F962_2_00007FFDA34E1F96
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E26EE2_2_00007FFDA34E26EE
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E6D5C2_2_00007FFDA34E6D5C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E11402_2_00007FFDA34E1140
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3694CF02_2_00007FFDA3694CF0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E55152_2_00007FFDA34E5515
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E68CA2_2_00007FFDA34E68CA
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34FD2602_2_00007FFDA34FD260
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA360D1D02_2_00007FFDA360D1D0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36211B02_2_00007FFDA36211B0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5BF52_2_00007FFDA34E5BF5
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E318E2_2_00007FFDA34E318E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E144C2_2_00007FFDA34E144C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA35052002_2_00007FFDA3505200
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E12172_2_00007FFDA34E1217
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E44082_2_00007FFDA34E4408
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E65A02_2_00007FFDA34E65A0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E10AA2_2_00007FFDA34E10AA
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E710D2_2_00007FFDA34E710D
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E3A942_2_00007FFDA34E3A94
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E54D42_2_00007FFDA34E54D4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36217E02_2_00007FFDA36217E0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5F102_2_00007FFDA34E5F10
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E4ACA2_2_00007FFDA34E4ACA
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E504C2_2_00007FFDA34E504C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E44CB2_2_00007FFDA34E44CB
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E56142_2_00007FFDA34E5614
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E428C2_2_00007FFDA34E428C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E53AD2_2_00007FFDA34E53AD
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA36994F02_2_00007FFDA36994F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E1CFD2_2_00007FFDA34E1CFD
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E36022_2_00007FFDA34E3602
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3681BF02_2_00007FFDA3681BF0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E53C62_2_00007FFDA34E53C6
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E4F432_2_00007FFDA34E4F43
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E216C2_2_00007FFDA34E216C
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E59FC2_2_00007FFDA34E59FC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E21352_2_00007FFDA34E2135
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E3A8A2_2_00007FFDA34E3A8A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E65642_2_00007FFDA34E6564
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E12992_2_00007FFDA34E1299
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E54CF2_2_00007FFDA34E54CF
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E15C82_2_00007FFDA34E15C8
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E54342_2_00007FFDA34E5434
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E26712_2_00007FFDA34E2671
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E3BA72_2_00007FFDA34E3BA7
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E29872_2_00007FFDA34E2987
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E72572_2_00007FFDA34E7257
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E736A2_2_00007FFDA34E736A
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E1D832_2_00007FFDA34E1D83
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E38372_2_00007FFDA34E3837
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E72AC2_2_00007FFDA34E72AC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3699CD02_2_00007FFDA3699CD0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E16222_2_00007FFDA34E1622
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E638E2_2_00007FFDA34E638E
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E50B02_2_00007FFDA34E50B0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3C1BB702_2_00007FFDA3C1BB70
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3C1F1002_2_00007FFDA3C1F100
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3C138502_2_00007FFDA3C13850
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA46E56C42_2_00007FFDA46E56C4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA46E82882_2_00007FFDA46E8288
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA46EA0782_2_00007FFDA46EA078
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E1EF1 appears 1585 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34312EE appears 568 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E24B9 appears 83 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E4840 appears 130 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E405C appears 783 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FF75A102B10 appears 47 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA349E055 appears 105 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA349DFBF appears 218 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E2A09 appears 172 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E3012 appears 55 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA3C13710 appears 105 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E688E appears 31 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E4D6D appears 35 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA3C136A0 appears 46 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E2739 appears 512 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FFDA34E698D appears 51 times
Source: file.exeStatic PE information: invalid certificate
Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: python3.dll.0.drStatic PE information: No import functions for PE file found
Source: file.exe, 00000000.00000003.2078659802.000002181B332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs file.exe
Source: file.exe, 00000000.00000003.2091542556.000002181B33B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs file.exe
Source: file.exe, 00000000.00000003.2077987715.000002181B332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs file.exe
Source: file.exe, 00000000.00000003.2079040953.000002181B332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs file.exe
Source: file.exe, 00000000.00000003.2078144390.000002181B332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs file.exe
Source: file.exe, 00000000.00000003.2079202900.000002181B332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs file.exe
Source: file.exe, 00000000.00000003.2078435707.000002181B332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs file.exe
Source: file.exe, 00000000.00000003.2078946153.000002181B332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs file.exe
Source: file.exe, 00000000.00000003.2087046471.000002181B33B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs file.exe
Source: file.exe, 00000000.00000003.2086703998.000002181B33B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibsslH vs file.exe
Source: file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs file.exe
Source: file.exe, 00000000.00000003.2089487815.000002181B33B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs file.exe
Source: file.exeBinary or memory string: OriginalFilename vs file.exe
Source: file.exe, 00000002.00000002.2123881111.00007FFD942E5000.00000002.00000001.01000000.00000011.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs file.exe
Source: file.exe, 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: OriginalFilenamelibsslH vs file.exe
Source: file.exe, 00000002.00000002.2127978085.00007FFDA57F6000.00000002.00000001.01000000.00000008.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs file.exe
Source: file.exe, 00000002.00000002.2127860770.00007FFDA5512000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs file.exe
Source: file.exe, 00000002.00000002.2125545910.00007FFD948A7000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamepython311.dll. vs file.exe
Source: file.exe, 00000002.00000002.2127502970.00007FFDA54C6000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs file.exe
Source: file.exe, 00000002.00000002.2126709512.00007FFDA3828000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: OriginalFilenamelibcryptoH vs file.exe
Source: file.exe, 00000002.00000002.2128165513.00007FFDAC067000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs file.exe
Source: file.exe, 00000002.00000002.2127190289.00007FFDA5472000.00000002.00000001.01000000.00000012.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs file.exe
Source: file.exe, 00000002.00000002.2127027976.00007FFDA4705000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs file.exe
Source: file.exe, 00000002.00000002.2119063937.00000239C2C10000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs file.exe
Source: file.exe, 00000002.00000002.2127736814.00007FFDA54EE000.00000002.00000001.01000000.0000000D.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs file.exe
Source: file.exe, 00000002.00000002.2125688081.00007FFDA3395000.00000002.00000001.01000000.00000013.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs file.exe
Source: classification engineClassification label: mal48.evad.winEXE@3/31@0/0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A108770 GetLastError,FormatMessageW,WideCharToMultiByte,0_2_00007FF75A108770
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002Jump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: libcrypto-1_1.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: libssl-1_1.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: file.exeStatic file information: File size 11169448 > 1048576
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: file.exe, 00000000.00000003.2091571829.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2123640277.00007FFD942E0000.00000002.00000001.01000000.00000011.sdmp
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs source: _rust.pyd.0.dr
Source: Binary string: C:\Users\runneradmin\AppData\Local\Temp\pip-req-build-qj8bun1p\src\_bcrypt\target\release\deps\bcrypt_rust.pdb source: _bcrypt.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb@@ source: file.exe, 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmp, libssl-1_1.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: _rust.pyd.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: file.exe, 00000002.00000002.2126503167.00007FFDA372F000.00000002.00000001.01000000.0000000A.sdmp, libcrypto-1_1.dll.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1u 30 May 2023built on: Wed May 31 23:27:41 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-1_1"not available source: file.exe, 00000002.00000002.2126503167.00007FFDA372F000.00000002.00000001.01000000.0000000A.sdmp, libcrypto-1_1.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: file.exe, 00000000.00000003.2077987715.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2128068524.00007FFDAC061000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: file.exe, 00000000.00000003.2077987715.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2128068524.00007FFDAC061000.00000002.00000001.01000000.00000005.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: D:\a\1\b\libcrypto-1_1.pdb source: file.exe, 00000002.00000002.2126503167.00007FFDA37B1000.00000002.00000001.01000000.0000000A.sdmp, libcrypto-1_1.dll.0.dr
Source: Binary string: C:\Users\runneradmin\AppData\Local\Temp\pip-req-build-qj8bun1p\src\_bcrypt\target\release\deps\bcrypt_rust.pdbR source: _bcrypt.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: file.exe, 00000002.00000002.2124080160.00007FFD9466B000.00000002.00000001.01000000.00000004.sdmp, python311.dll.0.dr
Source: Binary string: D:\a\1\b\libssl-1_1.pdb source: file.exe, 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmp, libssl-1_1.dll.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: file.exe, 00000000.00000003.2089487815.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127931710.00007FFDA57F3000.00000002.00000001.01000000.00000008.sdmp, select.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_decimal.pdb$$ source: _decimal.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: file.exe, 00000000.00000003.2078659802.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127682349.00007FFDA54E7000.00000002.00000001.01000000.0000000D.sdmp, _hashlib.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2125620415.00007FFDA338C000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: crypto\stack\stack.cOPENSSL_sk_dupOPENSSL_sk_deep_copysk_reserveOPENSSL_sk_new_reserveOPENSSL_sk_reserveOPENSSL_sk_insertOPENSSL_sk_seti=%dcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC3.1.4built on: Fri Nov 24 00:12:45 2023 UTCplatform: VC-WIN64AOPENSSLDIR: "C:\Program Files\Common Files\SSL"userSDIR: "C:\Program Files\OpenSSL\lib\users-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availablecrypto\init.cOPENSSL_init_cryptoOPENSSL_atexitcrypto\bio\bio_lib.cBIO_new_exbio_read_internbio_write_internBIO_putsBIO_getsBIO_get_line BIO_ctrlBIO_callback_ctrlBIO_find_type source: _rust.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: file.exe, 00000000.00000003.2078946153.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127421041.00007FFDA54C3000.00000002.00000001.01000000.0000000E.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: file.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2125620415.00007FFDA338C000.00000002.00000001.01000000.00000013.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: file.exe, 00000000.00000003.2078144390.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127143410.00007FFDA546D000.00000002.00000001.01000000.00000012.sdmp
Source: Binary string: X509_SIGPKCS8_encrypt_excrypto\pkcs12\p12_p8e.cPKCS8_set0_pbe_excompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs source: _rust.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: file.exe, 00000000.00000003.2079040953.000002181B332000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2127817019.00007FFDA5508000.00000002.00000001.01000000.00000007.sdmp, _socket.pyd.0.dr
Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: file.exe, 00000000.00000003.2087046471.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2119063937.00000239C2C10000.00000002.00000001.01000000.00000006.sdmp
Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: file.exe, 00000002.00000002.2126938285.00007FFDA46ED000.00000002.00000001.01000000.00000009.sdmp, _ssl.pyd.0.dr
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: file.exeStatic PE information: section name: _RDATA
Source: libcrypto-1_1.dll.0.drStatic PE information: section name: .00cfg
Source: libssl-1_1.dll.0.drStatic PE information: section name: .00cfg
Source: python311.dll.0.drStatic PE information: section name: PyRuntim
Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA337D390 push rsi; iretd 2_2_00007FFDA337D3A5
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA337D418 push rsi; retf 2_2_00007FFDA337D419
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33C4196 push 2B41C88Bh; iretd 2_2_00007FFDA33C419B
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33C4CBC push 2B41C88Bh; iretd 2_2_00007FFDA33C4CC1

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\file.exeProcess created: "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\libcrypto-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard\backend_c.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\_queue.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\select.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\VCRUNTIME140.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\libssl-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\python311.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\_ssl.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md__mypyc.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard\_cffi.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography\hazmat\bindings\_rust.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\_cffi_backend.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\bcrypt\_bcrypt.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI71002\python3.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1053F0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF75A1053F0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5731 rdtsc 2_2_00007FFDA34E5731
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\_queue.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard\backend_c.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\select.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\python311.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\_ssl.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md__mypyc.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard\_cffi.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography\hazmat\bindings\_rust.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\_cffi_backend.cp311-win_amd64.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\bcrypt\_bcrypt.pydJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI71002\python3.dllJump to dropped file
Source: C:\Users\user\Desktop\file.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-17434
Source: C:\Users\user\Desktop\file.exeAPI coverage: 1.7 %
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A108D00 FindFirstFileExW,FindClose,0_2_00007FF75A108D00
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A118670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF75A118670
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A118670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF75A118670
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1226C4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF75A1226C4
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E322E _errno,malloc,_errno,memset,MultiByteToWideChar,GetLastError,MultiByteToWideChar,MultiByteToWideChar,free,_errno,FindFirstFileW,_errno,FindNextFileW,WideCharToMultiByte,2_2_00007FFDA34E322E
Source: file.exe, 00000000.00000003.2080560064.000002181B332000.00000004.00000020.00020000.00000000.sdmp, cacert.pem.0.drBinary or memory string: j2aTPs+9xYa9+bG3tD60B8jzljHz7aRP+KNOjSkVWLjVb3/ubCK1sK9IRQq9qEmU
Source: file.exe, 00000002.00000003.2101360000.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101768333.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107232156.00000239C340E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121174220.00000239C3415000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107932805.00000239C340F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109777948.00000239C3415000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108348320.00000239C3413000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWstem%SystemRoot%\system32\mswsock.dllr
Source: cacert.pem.0.drBinary or memory string: zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E57312_2_00007FFDA34E5731
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E42462_2_00007FFDA34E4246
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5731 rdtsc 2_2_00007FFDA34E5731
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A11B3CC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF75A11B3CC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A1242D0 GetProcessHeap,0_2_00007FF75A1242D0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A11B3CC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF75A11B3CC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A10CA9C SetUnhandledExceptionFilter,0_2_00007FF75A10CA9C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A10C030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF75A10C030
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A10C8BC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF75A10C8BC
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFD941D2A90 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFD941D2A90
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFD941D3058 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFD941D3058
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3383BB0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFDA3383BB0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA33835E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFDA33835E0
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA340EC00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFDA340EC00
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3432009 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFDA3432009
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E5A24 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFDA34E5A24
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3C232D8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFDA3C232D8
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA3C22D10 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFDA3C22D10
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A12A620 cpuid 0_2_00007FF75A12A620
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\certifi VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography-41.0.7.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography-41.0.7.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography-41.0.7.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography-41.0.7.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography-41.0.7.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography-41.0.7.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\bcrypt VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography-41.0.7.dist-info VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\libcrypto-1_1.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\_lzma.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\_socket.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\select.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\_ssl.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\zstandard\backend_c.cp311-win_amd64.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\_queue.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md.cp311-win_amd64.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md__mypyc.cp311-win_amd64.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\unicodedata.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\_bz2.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\_lzma.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI71002 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A10C7A0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF75A10C7A0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF75A126B50 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF75A126B50
Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00007FFDA34E2B62 bind,WSAGetLastError,2_2_00007FFDA34E2B62
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory31
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS22
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\_MEI71002\VCRUNTIME140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\VCRUNTIME140.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\_bz2.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\_bz2.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\_cffi_backend.cp311-win_amd64.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\_cffi_backend.cp311-win_amd64.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\_decimal.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\_decimal.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\_hashlib.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\_hashlib.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\_lzma.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\_lzma.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\_queue.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\_queue.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\_socket.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\_socket.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\_ssl.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\_ssl.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\bcrypt\_bcrypt.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\bcrypt\_bcrypt.pyd1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md.cp311-win_amd64.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md.cp311-win_amd64.pyd1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md__mypyc.cp311-win_amd64.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\charset_normalizer\md__mypyc.cp311-win_amd64.pyd0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography\hazmat\bindings\_rust.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\cryptography\hazmat\bindings\_rust.pyd1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\_MEI71002\libcrypto-1_1.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI71002\libcrypto-1_1.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
https://www.python.org/download/releases/2.3/mro/.0%URL Reputationsafe
https://cryptography.io/0%URL Reputationsafe
https://httpbin.org/post0%URL Reputationsafe
https://docs.rs/getrandom#nodejs-es-module-support0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
https://yahoo.com/0%URL Reputationsafe
https://tools.ietf.org/html/rfc2388#section-4.40%URL Reputationsafe
https://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%URL Reputationsafe
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-60%URL Reputationsafe
http://cacerts.digicert.co0%URL Reputationsafe
https://html.spec.whatwg.org/multipage/0%URL Reputationsafe
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings0%URL Reputationsafe
https://cryptography.io/en/latest/changelog/0%URL Reputationsafe
http://www.iana.org/time-zones/repository/tz-link.html0%URL Reputationsafe
https://mail.python.org/mailman/listinfo/cryptography-dev0%URL Reputationsafe
https://requests.readthedocs.io0%URL Reputationsafe
https://peps.python.org/pep-0205/0%URL Reputationsafe
http://curl.haxx.se/rfc/cookie_spec.html0%URL Reputationsafe
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%URL Reputationsafe
https://httpbin.org/get0%URL Reputationsafe
https://sectigo.com/CPS00%URL Reputationsafe
https://www.python.org0%URL Reputationsafe
https://www.python.org/0%URL Reputationsafe
https://json.org0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
https://httpbin.org/0%URL Reputationsafe
https://www.apache.org/licenses/0%URL Reputationsafe
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file0%URL Reputationsafe
http://www.cl.cam.ac.uk/~mgk25/iso-time.html0%URL Reputationsafe
https://twitter.com/0%URL Reputationsafe
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%URL Reputationsafe
https://cryptography.io/en/latest/installation/0%URL Reputationsafe
https://www.python.org/psf/license/0%URL Reputationsafe
https://img.shields.io/pypi/v/cryptography.svg0%URL Reputationsafe
http://wwwsearch.sf.net/):0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://tools.ietf.org/html/rfc6125#section-6.4.30%URL Reputationsafe
https://mahler:8092/site-updates.py0%Avira URL Cloudsafe
https://cryptography.io/en/latest/security/0%URL Reputationsafe
https://cffi.readthedocs.io/en/latest/using.html#callbacks0%URL Reputationsafe
http://.../back.jpeg0%Avira URL Cloudsafe
https://www.openssl.org/H0%URL Reputationsafe
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm0%URL Reputationsafe
http://google.com/0%Avira URL Cloudsafe
https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy0%URL Reputationsafe
https://cryptography.io0%URL Reputationsafe
https://peps.python.org/pep-0263/0%URL Reputationsafe
https://foss.heptapod.net/pypy/pypy/-/issues/35390%URL Reputationsafe
https://github.com/pyca/cryptography/issues/89960%Avira URL Cloudsafe
https://github.com/pyca/cryptography0%Avira URL Cloudsafe
https://github.com/pyca/cryptography/0%Avira URL Cloudsafe
https://github.com/Ousret/charset_normalizer0%Avira URL Cloudsafe
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
https://github.com/urllib3/urllib3/issues/29200%Avira URL Cloudsafe
https://github.com/pyca/cryptography/actions?query=workflow%3ACI0%Avira URL Cloudsafe
http://google.com/1%VirustotalBrowse
https://github.com/pyca/cryptography/issues/89960%VirustotalBrowse
https://github.com/Ousret/charset_normalizer0%VirustotalBrowse
https://github.com/pyca/cryptography0%VirustotalBrowse
http://hg.python.org/cpython/file/603b4d59370%Avira URL Cloudsafe
https://github.com/pyca/cryptography/0%VirustotalBrowse
https://pluvinecollutstogie.sbs/id777index0%Avira URL Cloudsafe
https://github.com/urllib3/urllib3/issues/29200%VirustotalBrowse
https://pluvinecollutstogie.sbs/id7770%Avira URL Cloudsafe
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%VirustotalBrowse
https://github.com/pyca/cryptography/actions?query=workflow%3ACI0%VirustotalBrowse
https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%Avira URL Cloudsafe
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%Avira URL Cloudsafe
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
https://pluvinecollutstogie.sbs/id7770%VirustotalBrowse
http://hg.python.org/cpython/file/603b4d59370%VirustotalBrowse
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main0%Avira URL Cloudsafe
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%Avira URL Cloudsafe
https://google.com/0%Avira URL Cloudsafe
https://google.com/mail/0%Avira URL Cloudsafe
https://bugs.python.org/issue42195.0%Avira URL Cloudsafe
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=main0%VirustotalBrowse
http://google.com/mail/0%Avira URL Cloudsafe
https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%VirustotalBrowse
https://google.com/1%VirustotalBrowse
https://google.com/mail/0%VirustotalBrowse
http://crPyObject_CheckReadBufferpython311.PyObject_CheckReadBufferPyObject_ClearWeakRefspython311.P0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%VirustotalBrowse
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%VirustotalBrowse
https://google.com/mail0%Avira URL Cloudsafe
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%Avira URL Cloudsafe
https://github.com/pyca/cryptography/issues0%Avira URL Cloudsafe
https://bugs.python.org/issue42195.0%VirustotalBrowse
https://github.com/pyca/bcrypt/__version_ex__4.1.2The0%Avira URL Cloudsafe
https://readthedocs.org/projects/cryptography/badge/?version=latest0%Avira URL Cloudsafe
http://google.com/mail/0%VirustotalBrowse
https://pypi.org/project/cryptography/0%Avira URL Cloudsafe
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.0%Avira URL Cloudsafe
https://github.com/pyca/cryptography/issues0%VirustotalBrowse
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%VirustotalBrowse
https://google.com/mail0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://google.com/file.exe, 00000002.00000003.2107470310.00000239C3421000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2110567806.00000239C3450000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107232156.00000239C340E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2110906844.00000239C3453000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C3443000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111082663.00000239C3464000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://mahler:8092/site-updates.pyfile.exe, 00000002.00000003.2105471619.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104835722.00000239C38B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104765849.00000239C3908000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2122509155.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106826126.00000239C3920000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106070756.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107422942.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106437603.00000239C3901000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104835722.00000239C38E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2105814384.00000239C38FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106796381.00000239C3916000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107342561.00000239C3926000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104325449.00000239C38CC000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/pyca/cryptography/issues/8996_rust.pyd.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0file.exefalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
http://ocsp.sectigo.com0file.exefalse
  • URL Reputation: safe
unknown
http://.../back.jpegfile.exe, 00000002.00000003.2104835722.00000239C38B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2122964981.00000239C3C40000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104716566.00000239C3222000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://github.com/pyca/cryptographyfile.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.python.org/download/releases/2.3/mro/.file.exe, 00000002.00000002.2119286783.00000239C2D00000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098027317.00000239C31A7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098073514.00000239C3184000.00000004.00000020.00020000.00000000.sdmp, base_library.zip.0.drfalse
  • URL Reputation: safe
unknown
https://cryptography.io/METADATA.0.drfalse
  • URL Reputation: safe
unknown
https://httpbin.org/postfile.exe, 00000002.00000003.2108047474.00000239C31BF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2115650014.00000239C31C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106513414.00000239C31BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108451542.00000239C31C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120001108.00000239C31C4000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://docs.rs/getrandom#nodejs-es-module-support_bcrypt.pyd.0.drfalse
  • URL Reputation: safe
unknown
https://github.com/pyca/cryptography/file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/Ousret/charset_normalizerfile.exe, 00000002.00000003.2111970200.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111255514.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#file.exefalse
  • URL Reputation: safe
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#file.exe, 00000002.00000003.2099430534.00000239C13FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2096439344.00000239C3141000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106855895.00000239C13DB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2114317566.00000239C1413000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099518287.00000239C1401000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2118572303.00000239C1414000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107882981.00000239C1406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099123421.00000239C1405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099804414.00000239C13F5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109428688.00000239C1410000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098285001.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100696562.00000239C13FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108940623.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098766089.00000239C13F5000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/urllib3/urllib3/issues/2920file.exe, 00000002.00000002.2122202015.00000239C3640000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/pyca/cryptography/actions?query=workflow%3ACIfile.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://yahoo.com/file.exe, 00000002.00000003.2106627313.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106610803.00000239C3518000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107583289.00000239C351E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106494916.00000239C350C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108495608.00000239C34FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://hg.python.org/cpython/file/603b4d5937file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121613410.00000239C349F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109093292.00000239C3499000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C348F000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://tools.ietf.org/html/rfc2388#section-4.4file.exe, 00000002.00000003.2107697642.00000239C31A3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2114474082.00000239C31A6000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://www.apache.org/licenses/LICENSE-2.0file.exe, 00000000.00000003.2081956102.000002181B343000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081387871.000002181B335000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2081346972.000002181B343000.00000004.00000020.00020000.00000000.sdmp, LICENSE.APACHE.0.drfalse
  • URL Reputation: safe
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64file.exe, 00000002.00000003.2102374817.00000239C3462000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107470310.00000239C3421000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101360000.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107232156.00000239C340E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109567235.00000239C3466000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101535138.00000239C3461000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C3443000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101688059.00000239C346D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102486918.00000239C346C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2110151704.00000239C346D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102150171.00000239C3450000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://pluvinecollutstogie.sbs/id777indexfile.exe, 00000002.00000002.2119644866.00000239C2F40000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6file.exe, 00000002.00000003.2106591896.00000239C3503000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109975810.00000239C3509000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://cacerts.digicert.cofile.exe, 00000000.00000003.2078796039.000002181B332000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://html.spec.whatwg.org/multipage/file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111373792.00000239C34E1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107907520.00000239C34D0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108987087.00000239C34D5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsfile.exe, 00000002.00000002.2122330234.00000239C3740000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://cryptography.io/en/latest/changelog/file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • URL Reputation: safe
unknown
https://pluvinecollutstogie.sbs/id777file.exe, 00000002.00000002.2119644866.00000239C2F40000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963file.exe, 00000002.00000002.2122202015.00000239C3640000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.iana.org/time-zones/repository/tz-link.htmlfile.exe, 00000002.00000003.2101768333.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102150171.00000239C3450000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://mail.python.org/mailman/listinfo/cryptography-devfile.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • URL Reputation: safe
unknown
https://requests.readthedocs.iofile.exe, 00000002.00000003.2108047474.00000239C31BF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2115650014.00000239C31C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2116021706.00000239C3DF8000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106513414.00000239C31BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108451542.00000239C31C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120001108.00000239C31C4000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://peps.python.org/pep-0205/file.exe, 00000002.00000002.2120171366.00000239C3240000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drfalse
  • URL Reputation: safe
unknown
http://curl.haxx.se/rfc/cookie_spec.htmlfile.exe, 00000002.00000003.2104251717.00000239C390B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2122330234.00000239C3740000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103420247.00000239C390B000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxyfile.exe, 00000002.00000002.2122330234.00000239C3740000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688file.exe, 00000002.00000003.2096439344.00000239C3141000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2119286783.00000239C2D88000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://httpbin.org/getfile.exe, 00000002.00000003.2116021706.00000239C3E28000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120126103.00000239C3221000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2105710336.00000239C3524000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2105814384.00000239C38FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107583289.00000239C3528000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108695923.00000239C3528000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106348484.00000239C3528000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106141104.00000239C31D9000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://sectigo.com/CPS0file.exefalse
  • URL Reputation: safe
unknown
https://www.python.orgfile.exe, 00000002.00000003.2108047474.00000239C31BF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2115650014.00000239C31C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106513414.00000239C31BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108451542.00000239C31C3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120001108.00000239C31C4000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://www.python.org/file.exe, 00000002.00000003.2105471619.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104835722.00000239C38B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104765849.00000239C3908000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2122509155.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106826126.00000239C3920000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106070756.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107422942.00000239C38DC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106437603.00000239C3901000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104835722.00000239C38E3000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2105814384.00000239C38FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106796381.00000239C3916000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107342561.00000239C3926000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104325449.00000239C38CC000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerfile.exe, 00000002.00000003.2099430534.00000239C13FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2096439344.00000239C3141000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106855895.00000239C13DB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2114317566.00000239C1413000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099518287.00000239C1401000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2118572303.00000239C1414000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107882981.00000239C1406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099123421.00000239C1405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099804414.00000239C13F5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109428688.00000239C1410000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098285001.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100696562.00000239C13FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108940623.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098766089.00000239C13F5000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://json.orgfile.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111772823.00000239C34DD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111970200.00000239C34DE000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#file.exefalse
  • URL Reputation: safe
unknown
https://httpbin.org/file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://www.apache.org/licenses/file.exe, 00000000.00000003.2081387871.000002181B335000.00000004.00000020.00020000.00000000.sdmp, LICENSE.APACHE.0.drfalse
  • URL Reputation: safe
unknown
https://github.com/pyca/cryptography/workflows/CI/badge.svg?branch=mainfile.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file_rust.pyd.0.drfalse
  • URL Reputation: safe
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.htmlfile.exe, 00000002.00000003.2101618066.00000239C3480000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101768333.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102150171.00000239C3450000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://twitter.com/file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121613410.00000239C349F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107470310.00000239C3421000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107232156.00000239C340E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109567235.00000239C3466000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109093292.00000239C3499000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C3443000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33F9000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://cryptography.io/en/latest/installation/file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • URL Reputation: safe
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syfile.exe, 00000002.00000003.2099430534.00000239C13FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2096439344.00000239C3141000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106855895.00000239C13DB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2114317566.00000239C1413000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099518287.00000239C1401000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2118572303.00000239C1414000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107882981.00000239C1406000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099123421.00000239C1405000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2099804414.00000239C13F5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109428688.00000239C1410000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098285001.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100696562.00000239C13FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108940623.00000239C140D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2098766089.00000239C13F5000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://google.com/file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://google.com/mail/file.exe, 00000002.00000003.2109498206.00000239C3473000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.python.org/psf/license/file.exe, 00000002.00000002.2124395084.00007FFD94708000.00000004.00000001.01000000.00000004.sdmp, python311.dll.0.drfalse
  • URL Reputation: safe
unknown
https://bugs.python.org/issue42195.file.exe, 00000002.00000003.2111125283.00000239C33B8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101768333.00000239C33C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C33B5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101360000.00000239C33B6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100755088.00000239C3456000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2100212085.00000239C3456000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2110269188.00000239C33B7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111817225.00000239C33B8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2120983564.00000239C33B8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102208957.00000239C33C0000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://img.shields.io/pypi/v/cryptography.svgfile.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • URL Reputation: safe
unknown
http://google.com/mail/file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108987087.00000239C34A5000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121639639.00000239C34AD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C348F000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://wwwsearch.sf.net/):file.exe, 00000002.00000003.2107073018.00000239C31CA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104251717.00000239C390B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106513414.00000239C31BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2111330977.00000239C31CB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106467560.00000239C31A0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106239216.00000239C3151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103420247.00000239C390B000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yfile.exefalse
  • URL Reputation: safe
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3file.exe, 00000002.00000002.2122964981.00000239C3C40000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://cryptography.io/en/latest/security/file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • URL Reputation: safe
unknown
https://cffi.readthedocs.io/en/latest/using.html#callbacks_cffi_backend.cp311-win_amd64.pyd.0.drfalse
  • URL Reputation: safe
unknown
https://www.openssl.org/Hfile.exe, 00000000.00000003.2086703998.000002181B33B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmp, file.exe, 00000002.00000002.2126709512.00007FFDA3828000.00000002.00000001.01000000.0000000A.sdmp, libssl-1_1.dll.0.dr, libcrypto-1_1.dll.0.drfalse
  • URL Reputation: safe
unknown
http://crPyObject_CheckReadBufferpython311.PyObject_CheckReadBufferPyObject_ClearWeakRefspython311.Pfile.exe, 00000000.00000003.2087073718.000002181B335000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://google.com/mailfile.exe, 00000002.00000003.2106627313.00000239C34F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106610803.00000239C3518000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107583289.00000239C351E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106494916.00000239C350C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2108495608.00000239C34FE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106115971.00000239C34F8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2104166897.00000239C34D7000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C34CD000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pyfile.exe, 00000002.00000003.2098766089.00000239C13F5000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htmfile.exe, 00000002.00000003.2101618066.00000239C3480000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2101768333.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102004693.00000239C33F9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2102150171.00000239C3450000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacyfile.exe, 00000002.00000003.2116021706.00000239C3DF8000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://cryptography.iofile.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • URL Reputation: safe
unknown
https://github.com/pyca/cryptography/issuesMETADATA.0.dr, _rust.pyd.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://github.com/pyca/bcrypt/__version_ex__4.1.2The_bcrypt.pyd.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://readthedocs.org/projects/cryptography/badge/?version=latestfile.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://peps.python.org/pep-0263/file.exe, 00000002.00000002.2124080160.00007FFD9466B000.00000002.00000001.01000000.00000004.sdmp, python311.dll.0.drfalse
  • URL Reputation: safe
unknown
https://pypi.org/project/cryptography/file.exe, 00000000.00000003.2082083725.000002181B338000.00000004.00000020.00020000.00000000.sdmp, METADATA.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://foss.heptapod.net/pypy/pypy/-/issues/3539file.exe, 00000002.00000002.2122202015.00000239C3640000.00000004.00001000.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.file.exe, 00000002.00000003.2107470310.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000002.2121613410.00000239C349F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2106627313.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2109093292.00000239C3499000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2107797394.00000239C348F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000002.00000003.2103852414.00000239C348F000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1443578
Start date and time:2024-05-18 02:05:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 54s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal48.evad.winEXE@3/31@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Report size exceeded maximum capacity and may have missing disassembly code.
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\_MEI71002\VCRUNTIME140.dllSecuriteInfo.com.Win64.SpywareX-gen.27721.19030.exeGet hashmaliciousPython Stealer, Discord Token StealerBrowse
    access_version_x32-64_pack.exeGet hashmaliciousUnknownBrowse
      https://c51k11nyj56k.pettisville.sbs/lander/FileRotator_ID428/download.phpGet hashmaliciousUnknownBrowse
        Wave32bit.exeGet hashmaliciousUnknownBrowse
          Wave32bit.exeGet hashmaliciousUnknownBrowse
            DeltaX.exeGet hashmaliciousXmrigBrowse
              Arceus.exeGet hashmaliciousXmrigBrowse
                DeltaX.exeGet hashmaliciousXmrigBrowse
                  SecuriteInfo.com.FileRepMalware.5539.23420.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.FileRepMalware.5539.23420.exeGet hashmaliciousUnknownBrowse
                      C:\Users\user\AppData\Local\Temp\_MEI71002\_bz2.pydaccess_version_x32-64_pack.exeGet hashmaliciousUnknownBrowse
                        https://c51k11nyj56k.pettisville.sbs/lander/FileRotator_ID428/download.phpGet hashmaliciousUnknownBrowse
                          Wave32bit.exeGet hashmaliciousUnknownBrowse
                            Wave32bit.exeGet hashmaliciousUnknownBrowse
                              DeltaX.exeGet hashmaliciousXmrigBrowse
                                Arceus.exeGet hashmaliciousXmrigBrowse
                                  DeltaX.exeGet hashmaliciousXmrigBrowse
                                    W1dMSoIHTz.exeGet hashmaliciousUnknownBrowse
                                      W1dMSoIHTz.exeGet hashmaliciousUnknownBrowse
                                        oNrzSFoBe5.exeGet hashmaliciousUnknownBrowse
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):109392
                                          Entropy (8bit):6.641929675972235
                                          Encrypted:false
                                          SSDEEP:1536:GcghbEGyzXJZDWnEzWG9q4lVOiVgXjO5/woecbq8qZHg2zuCS+zuecL:GV3iC0h9q4v6XjKwoecbq8qBTq+1cL
                                          MD5:4585A96CC4EEF6AAFD5E27EA09147DC6
                                          SHA1:489CFFF1B19ABBEC98FDA26AC8958005E88DD0CB
                                          SHA-256:A8F950B4357EC12CFCCDDC9094CCA56A3D5244B95E09EA6E9A746489F2D58736
                                          SHA-512:D78260C66331FE3029D2CC1B41A5D002EC651F2E3BBF55076D65839B5E3C6297955AFD4D9AB8951FBDC9F929DBC65EB18B14B59BCE1F2994318564EB4920F286
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Joe Sandbox View:
                                          • Filename: SecuriteInfo.com.Win64.SpywareX-gen.27721.19030.exe, Detection: malicious, Browse
                                          • Filename: access_version_x32-64_pack.exe, Detection: malicious, Browse
                                          • Filename: , Detection: malicious, Browse
                                          • Filename: Wave32bit.exe, Detection: malicious, Browse
                                          • Filename: Wave32bit.exe, Detection: malicious, Browse
                                          • Filename: DeltaX.exe, Detection: malicious, Browse
                                          • Filename: Arceus.exe, Detection: malicious, Browse
                                          • Filename: DeltaX.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.FileRepMalware.5539.23420.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.FileRepMalware.5539.23420.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........u...u...u.E.t...u.....u...t...u..v...u..q...u..p...u..u...u......u..w...u.Rich..u.........PE..d..._#;..........." ...".....`......................................................=.....`A........................................`C..4....K...............p.......\..PO...........-..p............................,..@............................................text............................... ..`.rdata...A.......B..................@..@.data...0....`.......D..............@....pdata.......p.......H..............@..@_RDATA..\............T..............@..@.rsrc................V..............@..@.reloc...............Z..............@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):84760
                                          Entropy (8bit):6.570831353064175
                                          Encrypted:false
                                          SSDEEP:1536:PdQz7pZ3catNZTRGE51LOBK5bib8tsfYqpIPCV17SyQPx:VQz9Z5VOwiItsAqpIPCV1Gx
                                          MD5:3859239CED9A45399B967EBCE5A6BA23
                                          SHA1:6F8FF3DF90AC833C1EB69208DB462CDA8CA3F8D6
                                          SHA-256:A4DD883257A7ACE84F96BCC6CD59E22D843D0DB080606DEFAE32923FC712C75A
                                          SHA-512:030E5CE81E36BD55F69D55CBB8385820EB7C1F95342C1A32058F49ABEABB485B1C4A30877C07A56C9D909228E45A4196872E14DED4F87ADAA8B6AD97463E5C69
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: access_version_x32-64_pack.exe, Detection: malicious, Browse
                                          • Filename: , Detection: malicious, Browse
                                          • Filename: Wave32bit.exe, Detection: malicious, Browse
                                          • Filename: Wave32bit.exe, Detection: malicious, Browse
                                          • Filename: DeltaX.exe, Detection: malicious, Browse
                                          • Filename: Arceus.exe, Detection: malicious, Browse
                                          • Filename: DeltaX.exe, Detection: malicious, Browse
                                          • Filename: W1dMSoIHTz.exe, Detection: malicious, Browse
                                          • Filename: W1dMSoIHTz.exe, Detection: malicious, Browse
                                          • Filename: oNrzSFoBe5.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A}...............d`.....J`......J`......J`......J`......J`.......`......Nd..........Z....`.......`.......`.......`......Rich............PE..d......d.........." ...".....^......L........................................P.......`....`.........................................p...H............0....... .. ......../...@..........T...........................p...@............................................text............................... ..`.rdata..L>.......@..................@..@.data...............................@....pdata.. .... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):181248
                                          Entropy (8bit):6.186854863391558
                                          Encrypted:false
                                          SSDEEP:3072:nmHfhrWGYV6sewRdFRId6PBNKcqDn/C1j/UyS7viSTLkKxalPu//ay/i:nmprWX6sPRNPBAn/0/dCiSTLL0P2/ay
                                          MD5:210DEF84BB2C35115A2B2AC25E3FFD8F
                                          SHA1:0376B275C81C25D4DF2BE4789C875B31F106BD09
                                          SHA-256:59767B0918859BEDDF28A7D66A50431411FFD940C32B3E8347E6D938B60FACDF
                                          SHA-512:CD5551EB7AFD4645860C7EDD7B0ABD375EE6E1DA934BE21A6099879C8EE3812D57F2398CAD28FBB6F75BBA77471D9B32C96C7C1E9D3B4D26C7FC838745746C7F
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........ ..MA.CMA.CMA.CD9MCAA.C.4.BOA.C+.#CIA.C.4.BFA.C.4.BEA.C.4.BIA.C.9.BIA.C.=.BNA.CMA.C.A.C.4.BIA.CD9KCLA.C.4.BLA.C.4!CLA.C.4.BLA.CRichMA.C........................PE..d...,..e.........." .........@..............................................0............`..........................................g..l...|g..................<............ .......M...............................M..8............................................text............................... ..`.rdata..l...........................@..@.data....\.......0...v..............@....pdata..<...........................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):253200
                                          Entropy (8bit):6.559097478184273
                                          Encrypted:false
                                          SSDEEP:6144:7t9gXW32tb0yf6CgLp+E4YECs5wxvj9qWM53pLW1Apw9tBg2YAp:7ngXW3wgyCiE4texvGI4Ap
                                          MD5:65B4AB77D6C6231C145D3E20E7073F51
                                          SHA1:23D5CE68ED6AA8EAABE3366D2DD04E89D248328E
                                          SHA-256:93EB9D1859EDCA1C29594491863BF3D72AF70B9A4240E0D9DD171F668F4F8614
                                          SHA-512:28023446E5AC90E9E618673C879CA46F598A62FBB9E69EF925DB334AD9CB1544916CAF81E2ECDC26B75964DCEDBA4AD4DE1BA2C42FB838D0DF504D963FCF17EE
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........nyR.............w.......s.......s.......s.......s.......s.......w.........._....s.......s.......s.......s.......s......Rich............PE..d......d.........." ...".v...<......L...............................................Rn....`..........................................T..P...`T...................&......./......P.......T...........................P...@............................................text....u.......v.................. ..`.rdata..<............z..............@..@.data....*...p...$...R..............@....pdata...&.......(...v..............@..@.rsrc...............................@..@.reloc..P...........................@..B........................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):65304
                                          Entropy (8bit):6.222786912280051
                                          Encrypted:false
                                          SSDEEP:1536:6TO+CPN/pV8ETeERZX/fchw/IpBIPOIVQ7SygPx:mClZZow/IpBIPOIVQyx
                                          MD5:4255C44DC64F11F32C961BF275AAB3A2
                                          SHA1:C1631B2821A7E8A1783ECFE9A14DB453BE54C30A
                                          SHA-256:E557873D5AD59FD6BD29D0F801AD0651DBB8D9AC21545DEFE508089E92A15E29
                                          SHA-512:7D3A306755A123B246F31994CD812E7922943CDBBC9DB5A6E4D3372EA434A635FFD3945B5D2046DE669E7983EF2845BD007A441D09CFE05CF346523C12BDAD52
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........F.u.'.&.'.&.'.&._,&.'.&.[.'.'.&.[.'.'.&.[.'.'.&.[.'.'.&._.'.'.&*[.'.'.&.'.&e'.&*[.'.'.&*[.'.'.&*[@&.'.&*[.'.'.&Rich.'.&........PE..d......d.........." ...".T...~......`?...............................................%....`.............................................P.......................,......../......\...0}..T............................{..@............p..(............................text...uR.......T.................. ..`.rdata...N...p...P...X..............@..@.data...8...........................@....pdata..,...........................@..@.rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):158992
                                          Entropy (8bit):6.8491146526380025
                                          Encrypted:false
                                          SSDEEP:3072:A4lirS97HrdVmEkGCm5hAznf49mNo2NOvJ02pIPZ1wBExN:VlirG0EkTVAYO2NQ3w
                                          MD5:E5ABC3A72996F8FDE0BCF709E6577D9D
                                          SHA1:15770BDCD06E171F0B868C803B8CF33A8581EDD3
                                          SHA-256:1796038480754A680F33A4E37C8B5673CC86C49281A287DC0C5CAE984D0CB4BB
                                          SHA-512:B347474DC071F2857E1E16965B43DB6518E35915B8168BDEFF1EAD4DFF710A1CC9F04CA0CED23A6DE40D717EEA375EEDB0BF3714DAF35DE6A77F071DB33DFAE6
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........*...D,..D,..D,...,..D,..E-..D,..A-..D,..@-..D,..G-..D,M.E-..D,..E-..D,..E,.D,M.I-..D,M.D-..D,M.,..D,M.F-..D,Rich..D,........PE..d...$..d.........." ...".b...........5....................................................`..........................................%..L...\%..x....p.......P.......>.../......8.......T...........................p...@............................................text....a.......b.................. ..`.rdata..............f..............@..@.data........@......................@....pdata.......P......................@..@.rsrc........p.......2..............@..@.reloc..8............<..............@..B................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):32528
                                          Entropy (8bit):6.448063770045404
                                          Encrypted:false
                                          SSDEEP:384:AuCvO+MZFryl9SDCP6rXv+mkWsniRq9IPQUkHQIYiSy1pCQqIPxh8E9VF0NykOBw:1+yF+6rX2mk599IPQUO5YiSyv3PxWEun
                                          MD5:F00133F7758627A15F2D98C034CF1657
                                          SHA1:2F5F54EDA4634052F5BE24C560154AF6647EEE05
                                          SHA-256:35609869EDC57D806925EC52CCA9BC5A035E30D5F40549647D4DA6D7983F8659
                                          SHA-512:1C77DD811D2184BEEDF3C553C3F4DA2144B75C6518543F98C630C59CD597FCBF6FD22CFBB0A7B9EA2FDB7983FF69D0D99E8201F4E84A0629BC5733AA09FFC201
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_X..1...1...1.......1...0...1...4...1...5...1...2...1.~.0...1...0...1...0...1.~.<...1.~.1...1.~.....1.~.3...1.Rich..1.........PE..d......d.........." ...".....8......................................................./....`..........................................C..L....C..d....p.......`.......P.../..........p4..T...........................03..@............0..0............................text............................... ..`.rdata..R....0......................@..@.data...x....P.......<..............@....pdata.......`.......@..............@..@.rsrc........p.......D..............@..@.reloc...............N..............@..B................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):79640
                                          Entropy (8bit):6.290841920161528
                                          Encrypted:false
                                          SSDEEP:1536:0JltpedXL+3ujz9/s+S+pzpMoiyivViaE9IPLwj7SyZPx:07tp4i3ujz9/sT+pzqoavVpE9IPLwjHx
                                          MD5:1EEA9568D6FDEF29B9963783827F5867
                                          SHA1:A17760365094966220661AD87E57EFE09CD85B84
                                          SHA-256:74181072392A3727049EA3681FE9E59516373809CED53E08F6DA7C496B76E117
                                          SHA-512:D9443B70FCDC4D0EA1CB93A88325012D3F99DB88C36393A7DED6D04F590E582F7F1640D8B153FE3C5342FA93802A8374F03F6CD37DD40CDBB5ADE2E07FAD1E09
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......RXY..97..97..97..A...97.YE6..97.YE2..97.YE3..97.YE4..97..E6..97..96..97.]A6..97..E:..97..E7..97..E...97..E5..97.Rich.97.................PE..d... ..d.........." ...".l...........%.......................................P......V.....`.............................................P............0....... ..x......../...@..........T...............................@............................................text...:k.......l.................. ..`.rdata...t.......v...p..............@..@.data...............................@....pdata..x.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):161040
                                          Entropy (8bit):6.029728458381984
                                          Encrypted:false
                                          SSDEEP:3072:LMaGbIQQbN9W3PiNGeA66l8rBk3xA87xfCA+nbUtFMsVjTNbEzc+pIPC7ODxd:LMaG0bN96oG1l8YA8ZMSR+E
                                          MD5:208B0108172E59542260934A2E7CFA85
                                          SHA1:1D7FFB1B1754B97448EB41E686C0C79194D2AB3A
                                          SHA-256:5160500474EC95D4F3AF7E467CC70CB37BEC1D12545F0299AAB6D69CEA106C69
                                          SHA-512:41ABF6DEAB0F6C048967CA6060C337067F9F8125529925971BE86681EC0D3592C72B9CC85DD8BDEE5DD3E4E69E3BB629710D2D641078D5618B4F55B8A60CC69D
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........p...p...p....8..p.......p.......p.......p.......p..N....p...p...q.......p..N....p..N....p..N.T..p..N....p..Rich.p..........................PE..d...'..d.........." ..."............l+..............................................NS....`.............................................d...t........`.......P.......F.../...p..8...0...T...............................@............................................text............................... ..`.rdata..............................@..@.data....j.......f..................@....pdata.......P......."..............@..@.rsrc........`......................@..@.reloc..8....p.......8..............@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                          Category:dropped
                                          Size (bytes):1438373
                                          Entropy (8bit):5.59108786847922
                                          Encrypted:false
                                          SSDEEP:24576:mQR5pATu7xm4lUKdcubgAnyfbcZ0iwhBdYf9P3sRHHL:mQR5plxmQJy
                                          MD5:2F6D57BCCF7F7735ACB884A980410F6A
                                          SHA1:93A6926887A08DC09CD92864CD82B2BEC7B24EC5
                                          SHA-256:1B7D326BAD406E96A4C83B5A49714819467E3174ED0A74F81C9EBD96D1DD40B3
                                          SHA-512:95BCFC66DBE7B6AD324BD2DC2258A3366A3594BFC50118AB37A2A204906109E42192FB10A91172B340CC28C12640513DB268C854947FB9ED8426F214FF8889B4
                                          Malicious:false
                                          Preview:PK..........!.h%..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):316928
                                          Entropy (8bit):6.399172981599646
                                          Encrypted:false
                                          SSDEEP:3072:RrdaOOOJPELEbEhSoKbVeKuJgu3rAkbK7xokgwHSkbj57ytyE/pZxFuVpOUrjenn:SO2h0b0KuJguLbLFhkn57MyE3xFWpOn
                                          MD5:169518669942F1B7C9A0BC4D0D98651F
                                          SHA1:4C2132A29ABCD0B2E26F96D7BA54BC8968CC4853
                                          SHA-256:4904336E5DDD08DB8BE7694EEF0D1D83DE6799D6412952A82DCA4847A3F46251
                                          SHA-512:270AB970EB7C9BD5DB40FEF76F78FCA68A40266390F16D971C946A086F7C079314B78E068477CD083D9FAE2E76EE7CC8A4D8BA7DDC4F5F5B0C78767B77A4F858
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^R...3...3...3...K...3.......3.......3.......3.......3.. ....3...F...3..QK...3...3...3...3..H3..w....3..w....3..Rich.3..........PE..d....e|e.........." ...&.b...p.......$....................................................`.............................................T........................"...................D..T....................E..(...PC..@............... ............................text...7`.......b.................. ..`.rdata..D?.......@...f..............@..@.data...............................@....pdata...".......$..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):290282
                                          Entropy (8bit):6.048183244201235
                                          Encrypted:false
                                          SSDEEP:6144:QW1H/M8fRR1jplkXURrVADwYCuCigT/Q5MSRqNb7d8iu5Np:QWN/TRJLWURrI55MWavdF0L
                                          MD5:302B49C5F476C0AE35571430BB2E4AA0
                                          SHA1:35A7837A3F1B960807BF46B1C95EC22792262846
                                          SHA-256:CF9D37FA81407AFE11DCC0D70FE602561422AA2344708C324E4504DB8C6C5748
                                          SHA-512:1345AF52984B570B1FF223032575FEB36CDFB4F38E75E0BD3B998BC46E9C646F7AC5C583D23A70460219299B9C04875EF672BF5A0D614618731DF9B7A5637D0A
                                          Malicious:false
                                          Preview:.# Issuer: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Subject: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Label: "GlobalSign Root CA".# Serial: 4835703278459707669005204.# MD5 Fingerprint: 3e:45:52:15:09:51:92:e1:b7:5d:37:9f:b1:87:29:8a.# SHA1 Fingerprint: b1:bc:96:8b:d4:f4:9d:62:2a:a8:9a:81:f2:15:01:52:a4:1d:82:9c.# SHA256 Fingerprint: eb:d4:10:40:e4:bb:3e:c7:42:c9:e3:81:d3:1e:f2:a4:1a:48:b6:68:5c:96:e7:ce:f3:c1:df:6c:d4:33:1c:99.-----BEGIN CERTIFICATE-----.MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG.A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv.b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw.MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i.YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT.aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ.jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp.xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):10752
                                          Entropy (8bit):4.663205590455457
                                          Encrypted:false
                                          SSDEEP:96:qlTp72HzA5iJewkY0hQMsQJCUCLsZEA4elh3XQMtCFNGioUjQcX6g8cim1qeSju1:ql12HzzjBbRYoesfoRcqgvimoe
                                          MD5:FA50D9F8BCE6BD13652F5090E7B82C4D
                                          SHA1:EE137DA302A43C2F46D4323E98FFD46D92CF4BEF
                                          SHA-256:FFF69928DEA1432E0C7CB1225AB96F94FD38D5D852DE9A6BB8BF30B7D2BEDCEB
                                          SHA-512:341CEC015E74348EAB30D86EBB35C028519703006814A2ECD19B9FE5E6FCB05EDA6DDE0AAF4FE624D254B0D0180EC32ADF3B93EE96295F8F0F4C9D4ED27A7C0C
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........=.V\..V\..V\.._$..T\... ..T\...$..T\... ..]\... ..^\... ..U\... ..U\..V\..p\.. ..W\.. ..W\.. z.W\.. ..W\..RichV\..........................PE..d......d.........." ...".....................................................p............`..........................................'..p...`(..d....P.......@...............`..,...`#.............................. "..@............ ...............................text............................... ..`.rdata....... ......................@..@.data...8....0......."..............@....pdata.......@.......$..............@..@.rsrc........P.......&..............@..@.reloc..,....`.......(..............@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):115712
                                          Entropy (8bit):5.890497931382238
                                          Encrypted:false
                                          SSDEEP:1536:rKLwVA2epJbdfD3NTSGkzsvDNIWN4ZgibPq0kgIWgymA5TGK2MLVur:rKL/dhTMzsbNd9ibPavPA5TGK7Qr
                                          MD5:2D1F2FFD0FECF96A053043DAAD99A5DF
                                          SHA1:B03D5F889E55E802D3802D0F0CAA4D29C538406B
                                          SHA-256:207BBAE9DDF8BDD64E65A8D600FE1DD0465F2AFCD6DC6E28D4D55887CD6CBD13
                                          SHA-512:4F7D68F241A7F581E143A010C78113154072C63ADFF5F200EF67EB34D766D14CE872D53183EB2B96B1895AA9C8D4CA82EE5E61E1C5E655FF5BE56970BE9EBE3E
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................o.........................................5...........m...L.....L.......L.......L.......Rich............................PE..d......d.........." ...".(...........,....................................................`.........................................P...d.......................................$...pu..............................0t..@............@...............................text....'.......(.................. ..`.rdata...S...@...T...,..............@..@.data...x8.......,..................@....pdata..............................@..@.rsrc...............................@..@.reloc..$...........................@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):4
                                          Entropy (8bit):1.5
                                          Encrypted:false
                                          SSDEEP:3:Mn:M
                                          MD5:365C9BFEB7D89244F2CE01C1DE44CB85
                                          SHA1:D7A03141D5D6B1E88B6B59EF08B6681DF212C599
                                          SHA-256:CEEBAE7B8927A3227E5303CF5E0F1F7B34BB542AD7250AC03FBCDE36EC2F1508
                                          SHA-512:D220D322A4053D84130567D626A9F7BB2FB8F0B854DA1621F001826DC61B0ED6D3F91793627E6F0AC2AC27AEA2B986B6A7A63427F05FE004D8A2ADFBDADC13C1
                                          Malicious:false
                                          Preview:pip.
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):197
                                          Entropy (8bit):4.61968998873571
                                          Encrypted:false
                                          SSDEEP:3:hWDncJhByZmJgXPForADu1QjygQuaAJygT2d5GeWreLRuOFEXAYeBKmJozlMHuO:h9Co8FyQjkDYc5tWreLBF/pn2mH1
                                          MD5:8C3617DB4FB6FAE01F1D253AB91511E4
                                          SHA1:E442040C26CD76D1B946822CAF29011A51F75D6D
                                          SHA-256:3E0C7C091A948B82533BA98FD7CBB40432D6F1A9ACBF85F5922D2F99A93AE6BB
                                          SHA-512:77A1919E380730BCCE5B55D76FBFFBA2F95874254FAD955BD2FE1DE7FC0E4E25B5FDAAB0FEFFD6F230FA5DC895F593CF8BFEDF8FDC113EFBD8E22FADAB0B8998
                                          Malicious:false
                                          Preview:This software is made available under the terms of *either* of the licenses.found in LICENSE.APACHE or LICENSE.BSD. Contributions to cryptography are made.under the terms of *both* these licenses..
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):11360
                                          Entropy (8bit):4.426756947907149
                                          Encrypted:false
                                          SSDEEP:192:nUDG5KXSD9VYUKhu1JVF9hFGvV/QiGkS594drFjuHYx5dvTrLh3kTSEnQHbHR:UIvlKM1zJlFvmNz5VrlkTS0QHt
                                          MD5:4E168CCE331E5C827D4C2B68A6200E1B
                                          SHA1:DE33EAD2BEE64352544CE0AA9E410C0C44FDF7D9
                                          SHA-256:AAC73B3148F6D1D7111DBCA32099F68D26C644C6813AE1E4F05F6579AA2663FE
                                          SHA-512:F451048E81A49FBFA11B49DE16FF46C52A8E3042D1BCC3A50AAF7712B097BED9AE9AED9149C21476C2A1E12F1583D4810A6D36569E993FE1AD3879942E5B0D52
                                          Malicious:false
                                          Preview:. Apache License. Version 2.0, January 2004. https://www.apache.org/licenses/.. TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION.. 1. Definitions... "License" shall mean the terms and conditions for use, reproduction,. and distribution as defined by Sections 1 through 9 of this document... "Licensor" shall mean the copyright owner or entity authorized by. the copyright owner that is granting the License... "Legal Entity" shall mean the union of the acting entity and all. other entities that control, are controlled by, or are under common. control with that entity. For the purposes of this definition,. "control" means (i) the power, direct or indirect, to cause the. direction or management of such entity, whether by contract or. otherwise, or (ii) ownership of fifty percent (50%) or more of the. outstanding shares, or (iii) beneficial ow
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):1532
                                          Entropy (8bit):5.058591167088024
                                          Encrypted:false
                                          SSDEEP:24:MjUnoorbOFFTJJyRrYFTjzMbmqEvBTP4m96432s4EOkUTKQROJ32s3yxsITf+3tY:MkOFJSrYJsaN5P406432svv32s3EsIqm
                                          MD5:5AE30BA4123BC4F2FA49AA0B0DCE887B
                                          SHA1:EA5B412C09F3B29BA1D81A61B878C5C16FFE69D8
                                          SHA-256:602C4C7482DE6479DD2E9793CDA275E5E63D773DACD1ECA689232AB7008FB4FB
                                          SHA-512:DDBB20C80ADBC8F4118C10D3E116A5CD6536F72077C5916D87258E155BE561B89EB45C6341A1E856EC308B49A4CB4DBA1408EABD6A781FBE18D6C71C32B72C41
                                          Malicious:false
                                          Preview:Copyright (c) Individual contributors..All rights reserved...Redistribution and use in source and binary forms, with or without.modification, are permitted provided that the following conditions are met:.. 1. Redistributions of source code must retain the above copyright notice,. this list of conditions and the following disclaimer... 2. Redistributions in binary form must reproduce the above copyright. notice, this list of conditions and the following disclaimer in the. documentation and/or other materials provided with the distribution... 3. Neither the name of PyCA Cryptography nor the names of its contributors. may be used to endorse or promote products derived from this software. without specific prior written permission...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND.ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED.WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):5292
                                          Entropy (8bit):5.115440205505611
                                          Encrypted:false
                                          SSDEEP:96:DxapqZink/QIHQIyzQIZQILuQIR8vtklGovxNx6sWwCvCCcTKvIrrg9BMM6VwDjz:sJnkoBs/sqLz8cTKvIrrUiM6VwDjyeWs
                                          MD5:137D13F917D94C83137A0FA5AE12B467
                                          SHA1:01E93402C225BF2A4EE59F9A06F8062CB5E4801E
                                          SHA-256:36738E6971D2F20DB78433185A0EF7912A48544AA6FF7006505A7DC785158859
                                          SHA-512:1B22CBC6E22FA5E2BD5CC4A370443A342D00E7DD53330A4000E9A680DE80262BCA7188764E3568944D01025188291602AC8C53C971630984FBD9FA7D75AAB124
                                          Malicious:false
                                          Preview:Metadata-Version: 2.1..Name: cryptography..Version: 41.0.7..Summary: cryptography is a package which provides cryptographic recipes and primitives to Python developers...Author-email: The Python Cryptographic Authority and individual contributors <cryptography-dev@python.org>..License: Apache-2.0 OR BSD-3-Clause..Project-URL: homepage, https://github.com/pyca/cryptography..Project-URL: documentation, https://cryptography.io/..Project-URL: source, https://github.com/pyca/cryptography/..Project-URL: issues, https://github.com/pyca/cryptography/issues..Project-URL: changelog, https://cryptography.io/en/latest/changelog/..Classifier: Development Status :: 5 - Production/Stable..Classifier: Intended Audience :: Developers..Classifier: License :: OSI Approved :: Apache Software License..Classifier: License :: OSI Approved :: BSD License..Classifier: Natural Language :: English..Classifier: Operating System :: MacOS :: MacOS X..Classifier: Operating System :: POSIX..Classifier: Operating Syst
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:CSV text
                                          Category:dropped
                                          Size (bytes):15240
                                          Entropy (8bit):5.548070237688736
                                          Encrypted:false
                                          SSDEEP:384:3XpsU/ZfaigkeVJN5Z6FGotqw+x6uvnPLEC:3OUxfzpctZEC
                                          MD5:F7C5BE55C15575749E2EB889653C563C
                                          SHA1:42DAED0D18BD14B3CBDF321B586B53734E4A53F9
                                          SHA-256:493D4FAED66428B4DAA4C8A3BCFC4E21B7D068A8F618E89A332A24FF9E049764
                                          SHA-512:2F5FE44B0672286A97C5DF4B351492125EAB20855A02BAA37FD308044698CAC7DDF622389AADD6DC1B555BADF21E8B7529E6F46D6135B0792A17E06A1151FC77
                                          Malicious:false
                                          Preview:cryptography-41.0.7.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4..cryptography-41.0.7.dist-info/LICENSE,sha256=Pgx8CRqUi4JTO6mP18u0BDLW8amsv4X1ki0vmak65rs,197..cryptography-41.0.7.dist-info/LICENSE.APACHE,sha256=qsc7MUj20dcRHbyjIJn2jSbGRMaBOuHk8F9leaomY_4,11360..cryptography-41.0.7.dist-info/LICENSE.BSD,sha256=YCxMdILeZHndLpeTzaJ15eY9dz2s0eymiSMqtwCPtPs,1532..cryptography-41.0.7.dist-info/METADATA,sha256=NnOOaXHS8g23hDMYWg73kSpIVEqm_3AGUFp9x4UViFk,5292..cryptography-41.0.7.dist-info/RECORD,,..cryptography-41.0.7.dist-info/WHEEL,sha256=-EX5DQzNGQEoyL99Q-0P0-D-CXbfqafenaAeiSQ_Ufk,100..cryptography-41.0.7.dist-info/top_level.txt,sha256=KNaT-Sn2K4uxNaEbe6mYdDn3qWDMlp4y-MtWfB73nJc,13..cryptography/__about__.py,sha256=uPXMbbcptt7EzZ_jllGRx0pVdMn-NBsAM4L74hOv-b0,445..cryptography/__init__.py,sha256=iVPlBlXWTJyiFeRedxcbMPhyHB34viOM10d72vGnWuE,364..cryptography/__pycache__/__about__.cpython-311.pyc,,..cryptography/__pycache__/__init__.cpython-311.pyc,,..cryptography/
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):100
                                          Entropy (8bit):5.0203365408149025
                                          Encrypted:false
                                          SSDEEP:3:RtEeX7MWcSlVlbY3KgP+tkKc/SKQLn:RtBMwlVCxWKxDQLn
                                          MD5:4B432A99682DE414B29A683A3546B69F
                                          SHA1:F59C5016889EE5E9F62D09B22AEFBC2211A56C93
                                          SHA-256:F845F90D0CCD190128C8BF7D43ED0FD3E0FE0976DFA9A7DE9DA01E89243F51F9
                                          SHA-512:CBBF10E19B6F4072C416EA95D7AE259B9C5A1B89068B7B6660B7C637D6F2437AEA8D8202A2E26A0BEC36DAECD8BBB6B59016FC2DDEB13C545F0868B3E15479CA
                                          Malicious:false
                                          Preview:Wheel-Version: 1.0.Generator: bdist_wheel (0.42.0).Root-Is-Purelib: false.Tag: cp37-abi3-win_amd64..
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:ASCII text
                                          Category:dropped
                                          Size (bytes):13
                                          Entropy (8bit):3.2389012566026314
                                          Encrypted:false
                                          SSDEEP:3:cOv:Nv
                                          MD5:E7274BD06FF93210298E7117D11EA631
                                          SHA1:7132C9EC1FD99924D658CC672F3AFE98AFEFAB8A
                                          SHA-256:28D693F929F62B8BB135A11B7BA9987439F7A960CC969E32F8CB567C1EF79C97
                                          SHA-512:AA6021C4E60A6382630BEBC1E16944F9B312359D645FC61219E9A3F19D876FD600E07DCA6932DCD7A1E15BFDEAC7DBDCEB9FFFCD5CA0E5377B82268ED19DE225
                                          Malicious:false
                                          Preview:cryptography.
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):6673920
                                          Entropy (8bit):6.582002531606852
                                          Encrypted:false
                                          SSDEEP:98304:EzN+T+xtLlk0PPMAiGoTzeDy3x8lGBlWi9Nk:E5Y6Jk0PPMtfTzp3x8c
                                          MD5:486085AAC7BB246A173CEEA0879230AF
                                          SHA1:EF1095843B2A9C6D8285C7D9E8E334A9CE812FAE
                                          SHA-256:C3964FC08E4CA8BC193F131DEF6CC4B4724B18073AA0E12FED8B87C2E627DC83
                                          SHA-512:8A56774A08DA0AB9DD561D21FEBEEBC23A5DEA6F63D5638EA1B608CD923B857DF1F096262865E6EBD56B13EFD3BBA8D714FFDCE8316293229974532C49136460
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......QN.../.../.../...W(../......./......./......./......./...R.../...Z.../..^W.../.../...-../...",......./.../.../......./......./..Rich./..........PE..d...M7ee.........." ...&..M..........L...................................... f...........`......................................... .a.p.....a.|............Pb..............Pe.p...p.[.T.....................[.(...0.[.@............0M..............................text.....M.......M................. ..`.rdata.......0M.......M.............@..@.data........0a.......a.............@....pdata.......Pb.......b.............@..@.reloc..p....Pe.......e.............@..B........................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):3445016
                                          Entropy (8bit):6.099467326309974
                                          Encrypted:false
                                          SSDEEP:98304:+/+YgEQaGDoWS04ki7x+QRsZ51CPwDv3uFfJx:MLgEXGUZ37x+VZ51CPwDv3uFfJx
                                          MD5:E94733523BCD9A1FB6AC47E10A267287
                                          SHA1:94033B405386D04C75FFE6A424B9814B75C608AC
                                          SHA-256:F20EB4EFD8647B5273FDAAFCEB8CCB2B8BA5329665878E01986CBFC1E6832C44
                                          SHA-512:07DD0EB86498497E693DA0F9DD08DE5B7B09052A2D6754CFBC2AA260E7F56790E6C0A968875F7803CB735609B1E9B9C91A91B84913059C561BFFED5AB2CBB29F
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........).h.z.h.z.h.z..Oz.h.z...{.h.z...{.h.z...{.h.z...{.h.z.h.zjh.z...{.h.z=..{.h.z=..{.j.z=..{.h.z=.#z.h.z=..{.h.zRich.h.z........................PE..d.....wd.........." ..."..$...................................................5......o5...`..........................................y/..h...J4.@.....4.|....p2......b4../....4..O..P.,.8.............................,.@............@4..............................text...$.$.......$................. ..`.rdata........$.......$.............@..@.data...!z....1..,....1.............@....pdata..h....p2.......1.............@..@.idata..^#...@4..$....3.............@..@.00cfg..u....p4.......3.............@..@.rsrc...|.....4.......3.............@..@.reloc...y....4..z....3.............@..B................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):704792
                                          Entropy (8bit):5.55753143710539
                                          Encrypted:false
                                          SSDEEP:12288:ihO7/rNKmrouK/POt6h+7ToRLgo479dQwwLOpWW/dQ0T9qwfU2lvzA:iis/POtrzbLp5dQ0T9qcU2lvzA
                                          MD5:25BDE25D332383D1228B2E66A4CB9F3E
                                          SHA1:CD5B9C3DD6AAB470D445E3956708A324E93A9160
                                          SHA-256:C8F7237E7040A73C2BEA567ACC9CEC373AADD48654AAAC6122416E160F08CA13
                                          SHA-512:CA2F2139BB456799C9F98EF8D89FD7C09D1972FA5DD8FC01B14B7AF00BF8D2C2175FB2C0C41E49A6DAF540E67943AAD338E33C1556FD6040EF06E0F25BFA88FA
                                          Malicious:false
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........q...q...q.....q..p...q..p...q..t...q..u...q..r...q.[.p...q...p.u.q.[.u...q.[.q...q.[.....q.[.s...q.Rich..q.........................PE..d.....wd.........." ...".D...T......<.....................................................`..........................................A...N..@U..........s........N......./......h.......8...............................@............@..@............................text....B.......D.................. ..`.rdata.../...`...0...H..............@..@.data...AM.......D...x..............@....pdata...V.......X..................@..@.idata..%W...@...X..................@..@.00cfg..u............l..............@..@.rsrc...s............n..............@..@.reloc..q............v..............@..B................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):67352
                                          Entropy (8bit):6.146621901948148
                                          Encrypted:false
                                          SSDEEP:768:rw/EsYpkVgBaz57kcDA7QKFmpz7cnzH/ks/KF61xubwmB1Cf//yhC74JFmpktJSy:8/5k8cnzeJf9IPL037SyG3Px
                                          MD5:B711598FC3ED0FE4CF2C7F3E0877979E
                                          SHA1:299C799E5D697834AA2447D8A313588AB5C5E433
                                          SHA-256:520169AA6CF49D7EE724D1178DE1BE0E809E4BDCF671E06F3D422A0DD5FD294A
                                          SHA-512:B3D59EFF5E38CEF651C9603971BDE77BE7231EA8B7BDB444259390A8A9E452E107A0B6CB9CC93E37FD3B40AFB2BA9E67217D648BFCA52F7CDC4B60C7493B6B84
                                          Malicious:false
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%{..a.e.a.e.a.e..fm.`.e..fe.`.e..f..`.e..fg.`.e.Richa.e.........................PE..d......d.........." ...".................................................................`.........................................`...P................................/..............T............................................................................rdata..............................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):5762840
                                          Entropy (8bit):6.089392282930885
                                          Encrypted:false
                                          SSDEEP:49152:73djosVvASxQKADxYBVD0NErnKqroleDkcWE/Q3pPITbwVFZL7VgVr42I1vJHH++:73ZOKRtlrJ7wfGrs1BHeM+2PocL2
                                          MD5:5A5DD7CAD8028097842B0AFEF45BFBCF
                                          SHA1:E247A2E460687C607253949C52AE2801FF35DC4A
                                          SHA-256:A811C7516F531F1515D10743AE78004DD627EBA0DC2D3BC0D2E033B2722043CE
                                          SHA-512:E6268E4FAD2CE3EF16B68298A57498E16F0262BF3531539AD013A66F72DF471569F94C6FCC48154B7C3049A3AD15CBFCBB6345DACB4F4ED7D528C74D589C9858
                                          Malicious:false
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......q.D.5.*.5.*.5.*.z.+.7.*.z...;.*.z./.9.*.z...=.*.z.).1.*.<../.*.~.+.>.*.5.+.P.*...'..*...*.4.*.....4.*...(.4.*.Rich5.*.........................PE..d......d.........." ...".X%..47.....\H........................................\.......X...`...........................................@......WA......p[.......V.d0....W../....[..C....).T.............................).@............p%..............................text...rV%......X%................. ..`.rdata.......p%......\%.............@..@.data.........A..L...hA.............@....pdata..d0....V..2....Q.............@..@PyRuntim......X.......S.............@....rsrc........p[......rV.............@..@.reloc...C....[..D...|V.............@..B........................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):30480
                                          Entropy (8bit):6.578957517354568
                                          Encrypted:false
                                          SSDEEP:384:N1ecReJKrHqDUI7A700EZ9IPQGNHQIYiSy1pCQn1tPxh8E9VF0NykfF:3eUeJGHqNbD9IPQGR5YiSyvnnPxWEuN
                                          MD5:C97A587E19227D03A85E90A04D7937F6
                                          SHA1:463703CF1CAC4E2297B442654FC6169B70CFB9BF
                                          SHA-256:C4AA9A106381835CFB5F9BADFB9D77DF74338BC66E69183757A5A3774CCDACCF
                                          SHA-512:97784363F3B0B794D2F9FD6A2C862D64910C71591006A34EEDFF989ECCA669AC245B3DFE68EAA6DA621209A3AB61D36E9118EBB4BE4C0E72CE80FAB7B43BDE12
                                          Malicious:false
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........tB.t'B.t'B.t'K..'@.t'..u&@.t'..q&N.t'..p&J.t'..w&F.t'..u&@.t'B.u'..t'..u&G.t'..y&C.t'..t&C.t'...'C.t'..v&C.t'RichB.t'................PE..d......d.........." ...".....2............................................................`..........................................@..L...,A..x....p.......`.......H.../......L....3..T............................2..@............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......6..............@....pdata.......`.......8..............@..@.rsrc........p.......<..............@..@.reloc..L............F..............@..B........................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):1141016
                                          Entropy (8bit):5.435086202175289
                                          Encrypted:false
                                          SSDEEP:12288:83kYbfjwR6nblonRiPDjRrO5184EPYPx++ZiLKGZ5KXyVH4eD1ol:8UYbMA0IDJcjEwPgPOG6Xyd461ol
                                          MD5:AA13EE6770452AF73828B55AF5CD1A32
                                          SHA1:C01ECE61C7623E36A834D8B3C660E7F28C91177E
                                          SHA-256:8FBED20E9225FF82132E97B4FEFBB5DDBC10C062D9E3F920A6616AB27BB5B0FB
                                          SHA-512:B2EEB9A7D4A32E91084FDAE302953AAC57388A5390F9404D8DFE5C4A8F66CA2AB73253CF5BA4CC55350D8306230DD1114A61E22C23F42FBCC5C0098046E97E0F
                                          Malicious:false
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................,...............,.....,.....,.y...,.....Rich..........PE..d......d.........." ...".@..........P*...............................................!....`.............................................X............`.......P..0....:.../...p.......]..T............................[..@............P..x............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data...H....0......................@....pdata..0....P.......&..............@..@.rsrc........`......................@..@.reloc.......p.......8..............@..B................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):655360
                                          Entropy (8bit):6.429498330590438
                                          Encrypted:false
                                          SSDEEP:12288:Xs/doJlY/OBzRSxUlcUmNNuNkOFIj+fWT0hrHPPoX1yZcG7:mAuOBzRSxUlvFIj+fWIPPM1yZcg
                                          MD5:4327027D7CB61F547E22C4F668EB7BF7
                                          SHA1:22F413D03A90D04D571526687E43EB255F427435
                                          SHA-256:E681900AEB771E57BC063E44B303293E11DF32F1B1FECDCBC00574C00E75626C
                                          SHA-512:16A2E2E262C0246906D48EA67EE17D38C07712A1B97EB18C4F8F656F39EB187E18DA3EDC6D2FDF49DC9E35B92F6BA6BDE0F00948C3E68E146F7EDCD1E9C9404A
                                          Malicious:false
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........p...p...p....)..p..!....p.......p..!....p..!....p..!....p..G....p...p...p..G....p..G....p..G.E..p..G....p..Rich.p..........................PE..d...f.Ae.........." ...#.....`...............................................P............`.............................................\...........0..........|5...........@.......s..............................Pr..@...............8............................text............................... ..`.rdata..............................@..@.data...0...........................@....pdata..|5.......6..................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                          Category:dropped
                                          Size (bytes):524800
                                          Entropy (8bit):6.43361179692515
                                          Encrypted:false
                                          SSDEEP:12288:LhqzrH09USNNSNkUvpMnAp5Oqwj/k6OsoOfu/PYS/O51Y/H:LhqzrH0evpMnApu86OsynYUPv
                                          MD5:DC08F04C9E03452764B4E228FC38C60B
                                          SHA1:317BCC3F9C81E2FC81C86D5A24C59269A77E3824
                                          SHA-256:B990EFBDA8A50C49CD7FDE5894F3C8F3715CB850F8CC4C10BC03FD92E310260F
                                          SHA-512:FBC24DD36AF658CECE54BE14C1118AF5FDA4E7C5B99D22F99690A1FD625CC0E8AA41FD9ACCD1C74BB4B03D494B6C3571B24F2EE423AAAE9A5AD50ADC583C52F7
                                          Malicious:false
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............t...t...t....:..t..S....t.......t..S....t..S....t..S....t..5....t...t..dt..5....t..5....t..5.V..t..5....t..Rich.t..........................PE..d...Z.Ae.........." ...#.....................................................@............`.............................................d...$........ ...........*...........0..d....k...............................j..@............... ............................text............................... ..`.rdata..............................@..@.data...(-.......(..................@....pdata...*.......,..................@..@.rsrc........ ......................@..@.reloc..d....0......................@..B................................................................................................................................................................................................................................
                                          File type:PE32+ executable (GUI) x86-64, for MS Windows
                                          Entropy (8bit):7.994345648851841
                                          TrID:
                                          • Win64 Executable GUI (202006/5) 92.65%
                                          • Win64 Executable (generic) (12005/4) 5.51%
                                          • Generic Win/DOS Executable (2004/3) 0.92%
                                          • DOS Executable Generic (2002/1) 0.92%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:file.exe
                                          File size:11'169'448 bytes
                                          MD5:fb7aaa1006f70fbfa147b89f23446ed3
                                          SHA1:203fd93ad7704755f0c6bedb050191f8aedc72cb
                                          SHA256:ab43d9e4e22c9e9fd0ed8cf7806a074e4b89ed31b752c9e3d949bb10cd2f0794
                                          SHA512:7f5d089530ecd1207040d927715e12edba8718d67b345f21af6c6b7a039d2c4a3c1d88b8a64967766c980fe7758c404a77a34463eb6870342fa1caab49fcede3
                                          SSDEEP:196608:dhQgDQsbuTID0pUzPLhQNQm8NkKeN4FMIZETKejPePdrQJ/B/9UQjnPv0kdqfp/:RMpUTLfhJKQETKevJt91jXvd2p
                                          TLSH:95B633CAE2E006F0C4968678D087C439E7E3757783749BA382F590961B7359BDA3AD31
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................-.....................,.............................................................Rich...........
                                          Icon Hash:23d0cc697123970c
                                          Entrypoint:0x14000c540
                                          Entrypoint Section:.text
                                          Digitally signed:true
                                          Imagebase:0x140000000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x6647EA56 [Fri May 17 23:37:58 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:2
                                          File Version Major:5
                                          File Version Minor:2
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:2
                                          Import Hash:f4f2e2b03fe5666a721620fcea3aea9b
                                          Signature Valid:false
                                          Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
                                          Signature Validation Error:The digital signature of the object did not verify
                                          Error Number:-2146869232
                                          Not Before, Not After
                                          • 12/01/2023 19:00:00 12/01/2026 18:59:59
                                          Subject Chain
                                          • CN=Adguard Software Limited, O=Adguard Software Limited, S=Lefkosia, C=CY
                                          Version:3
                                          Thumbprint MD5:97CB1ECDC7F0BCBB54ACA397BB03E6D1
                                          Thumbprint SHA-1:48BAFFCE2694F647A33854183A4B817BB8A7DBEA
                                          Thumbprint SHA-256:453226C42EB62A278F091B0155200D76DD284A1337795B6EB37A627D414F1284
                                          Serial:00B138E6660DCA7CC377CB2F6F6027F616
                                          Instruction
                                          dec eax
                                          sub esp, 28h
                                          call 00007FAE088030CCh
                                          dec eax
                                          add esp, 28h
                                          jmp 00007FAE08802CEFh
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          dec eax
                                          sub esp, 28h
                                          call 00007FAE08803644h
                                          test eax, eax
                                          je 00007FAE08802E93h
                                          dec eax
                                          mov eax, dword ptr [00000030h]
                                          dec eax
                                          mov ecx, dword ptr [eax+08h]
                                          jmp 00007FAE08802E77h
                                          dec eax
                                          cmp ecx, eax
                                          je 00007FAE08802E86h
                                          xor eax, eax
                                          dec eax
                                          cmpxchg dword ptr [00034FACh], ecx
                                          jne 00007FAE08802E60h
                                          xor al, al
                                          dec eax
                                          add esp, 28h
                                          ret
                                          mov al, 01h
                                          jmp 00007FAE08802E69h
                                          int3
                                          int3
                                          int3
                                          dec eax
                                          sub esp, 28h
                                          test ecx, ecx
                                          jne 00007FAE08802E79h
                                          mov byte ptr [00034F95h], 00000001h
                                          call 00007FAE08803451h
                                          call 00007FAE08803A58h
                                          test al, al
                                          jne 00007FAE08802E76h
                                          xor al, al
                                          jmp 00007FAE08802E86h
                                          call 00007FAE088119EFh
                                          test al, al
                                          jne 00007FAE08802E7Bh
                                          xor ecx, ecx
                                          call 00007FAE08803A68h
                                          jmp 00007FAE08802E5Ch
                                          mov al, 01h
                                          dec eax
                                          add esp, 28h
                                          ret
                                          int3
                                          int3
                                          inc eax
                                          push ebx
                                          dec eax
                                          sub esp, 20h
                                          cmp byte ptr [00034F5Ch], 00000000h
                                          mov ebx, ecx
                                          jne 00007FAE08802ED9h
                                          cmp ecx, 01h
                                          jnbe 00007FAE08802EDCh
                                          call 00007FAE088035BAh
                                          test eax, eax
                                          je 00007FAE08802E9Ah
                                          test ebx, ebx
                                          jne 00007FAE08802E96h
                                          dec eax
                                          lea ecx, dword ptr [00034F46h]
                                          call 00007FAE088117E2h
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3e0bc0x78.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x470000x4834.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x430000x231c.pdata
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0xaa41d00x2cd8
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x4c0000x758.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x3b4600x1c.rdata
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3b3200x140.rdata
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x2c0000x438.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x2afb00x2b00040bf1edebd1304ce1b08c50cb556d4dbFalse0.5458416606104651data6.5002315273868IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x2c0000x12f360x130002d50501c59f18357408e5fe74e063ec7False0.5160875822368421data5.827958533270037IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x3f0000x33b80xe00ae0f42b168987b17129506ccc4960b21False0.13392857142857142firmware 32a2 vdf2d (revision 2569732096) \377\377\377\377 , version 256.0.512, 0 bytes or less, at 0xcd5d20d2 1725235199 bytes , at 0 0 bytes , at 0xffffffff 16777216 bytes1.8264700601019173IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .pdata0x430000x231c0x2400ffc5390666982cab67e3c9bf8e263bc3False0.4784071180555556data5.382434020909434IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          _RDATA0x460000x1f40x200771f0b097891d31289bb68f0eb426e66False0.529296875data3.713242247775091IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .rsrc0x470000x48340x4a00ececca37e3bad8066b84c6d7331985d4False0.17546452702702703data4.249579346146195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x4c0000x7580x8007ecf18b15822e1aa4c79b9a361f07c79False0.546875data5.250941834312499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x470e80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 00.14850023618327823
                                          RT_GROUP_ICON0x4b3100x14data1.05
                                          RT_MANIFEST0x4b3240x50dXML 1.0 document, ASCII text0.4694508894044857
                                          DLLImport
                                          USER32.dllCreateWindowExW, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                          COMCTL32.dll
                                          KERNEL32.dllIsValidCodePage, GetStringTypeW, GetFileAttributesExW, HeapReAlloc, FlushFileBuffers, GetCurrentDirectoryW, GetACP, GetOEMCP, GetModuleHandleW, MulDiv, GetLastError, SetDllDirectoryW, CreateFileW, GetFinalPathNameByHandleW, CloseHandle, GetModuleFileNameW, CreateSymbolicLinkW, GetCPInfo, GetCommandLineW, GetEnvironmentVariableW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, CreateDirectoryW, GetTempPathW, WaitForSingleObject, Sleep, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, SetConsoleCtrlHandler, FindClose, FindFirstFileExW, GetCurrentProcess, LocalFree, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, WriteConsoleW, SetEndOfFile, GetProcAddress, GetSystemTimeAsFileTime, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetFullPathNameW, RemoveDirectoryW, FindNextFileW, SetStdHandle, DeleteFileW, ReadFile, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                          ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                          GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                          No network behavior found

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:20:05:56
                                          Start date:17/05/2024
                                          Path:C:\Users\user\Desktop\file.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                          Imagebase:0x7ff75a100000
                                          File size:11'169'448 bytes
                                          MD5 hash:FB7AAA1006F70FBFA147B89F23446ED3
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:20:05:58
                                          Start date:17/05/2024
                                          Path:C:\Users\user\Desktop\file.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                          Imagebase:0x7ff75a100000
                                          File size:11'169'448 bytes
                                          MD5 hash:FB7AAA1006F70FBFA147B89F23446ED3
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:10.8%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:23.6%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:40
                                            execution_graph 16406 7ff75a10c3cc 16429 7ff75a10c59c 16406->16429 16409 7ff75a10c518 16537 7ff75a10c8bc IsProcessorFeaturePresent 16409->16537 16410 7ff75a10c3e8 __scrt_acquire_startup_lock 16412 7ff75a10c522 16410->16412 16415 7ff75a10c406 16410->16415 16413 7ff75a10c8bc 7 API calls 16412->16413 16414 7ff75a10c52d __FrameHandler3::FrameUnwindToEmptyState 16413->16414 16417 7ff75a10c42b 16415->16417 16421 7ff75a10c448 __scrt_release_startup_lock 16415->16421 16522 7ff75a11a58c 16415->16522 16418 7ff75a10c4b1 16435 7ff75a10ca04 16418->16435 16420 7ff75a10c4b6 16438 7ff75a101000 16420->16438 16421->16418 16526 7ff75a11a8e0 16421->16526 16426 7ff75a10c4d9 16426->16414 16533 7ff75a10c720 16426->16533 16430 7ff75a10c5a4 16429->16430 16431 7ff75a10c5b0 __scrt_dllmain_crt_thread_attach 16430->16431 16432 7ff75a10c3e0 16431->16432 16433 7ff75a10c5bd 16431->16433 16432->16409 16432->16410 16433->16432 16544 7ff75a10d1c0 16433->16544 16571 7ff75a12b580 16435->16571 16439 7ff75a10100b 16438->16439 16573 7ff75a1089b0 16439->16573 16441 7ff75a10101d 16580 7ff75a1166e8 16441->16580 16443 7ff75a1039ab 16587 7ff75a101ea0 16443->16587 16446 7ff75a103ab2 16448 7ff75a10c010 _wfindfirst32i64 8 API calls 16446->16448 16449 7ff75a103b73 16448->16449 16531 7ff75a10ca48 GetModuleHandleW 16449->16531 16450 7ff75a1039ca 16450->16446 16612 7ff75a107d70 16450->16612 16452 7ff75a1039ff 16453 7ff75a103a4b 16452->16453 16455 7ff75a107d70 61 API calls 16452->16455 16627 7ff75a108250 16453->16627 16459 7ff75a103a20 __vcrt_freefls 16455->16459 16456 7ff75a103a60 16631 7ff75a101ca0 16456->16631 16459->16453 16463 7ff75a108250 58 API calls 16459->16463 16460 7ff75a103b2d 16462 7ff75a103b8d 16460->16462 16650 7ff75a108b80 16460->16650 16461 7ff75a101ca0 121 API calls 16464 7ff75a103a96 16461->16464 16462->16446 16469 7ff75a103bdb 16462->16469 16674 7ff75a108de0 16462->16674 16463->16453 16467 7ff75a103a9a 16464->16467 16468 7ff75a103ab7 16464->16468 16750 7ff75a102b10 16467->16750 16468->16460 16763 7ff75a104060 16468->16763 16688 7ff75a106ff0 16469->16688 16471 7ff75a103bc0 16475 7ff75a103b53 16471->16475 16476 7ff75a103bce SetDllDirectoryW 16471->16476 16482 7ff75a102b10 59 API calls 16475->16482 16476->16469 16479 7ff75a103c27 16487 7ff75a103d11 16479->16487 16496 7ff75a103c46 16479->16496 16481 7ff75a103ad5 16488 7ff75a102b10 59 API calls 16481->16488 16482->16446 16485 7ff75a103bf5 16485->16479 16795 7ff75a106800 16485->16795 16486 7ff75a103b03 16486->16460 16490 7ff75a103b08 16486->16490 16692 7ff75a1034a0 16487->16692 16488->16446 16782 7ff75a11097c 16490->16782 16495 7ff75a103c88 16495->16446 16499 7ff75a103cb9 PostMessageW GetMessageW 16495->16499 16505 7ff75a103cdc 16495->16505 16496->16495 16831 7ff75a101ee0 16496->16831 16497 7ff75a103c29 16500 7ff75a106a50 FreeLibrary 16497->16500 16499->16505 16500->16479 16504 7ff75a103d2b 16700 7ff75a1081e0 16504->16700 16835 7ff75a103440 16505->16835 16509 7ff75a103d3e 16511 7ff75a107d70 61 API calls 16509->16511 16513 7ff75a103d4a 16511->16513 16512 7ff75a103cec 16514 7ff75a106a50 FreeLibrary 16512->16514 16515 7ff75a103d7a 16513->16515 16516 7ff75a103d57 PostMessageW GetMessageW 16513->16516 16514->16446 16707 7ff75a108290 16515->16707 16516->16515 16523 7ff75a11a5c2 16522->16523 16524 7ff75a11a591 16522->16524 16523->16421 16524->16523 19381 7ff75a115b00 16524->19381 16527 7ff75a11a918 16526->16527 16528 7ff75a11a8f7 16526->16528 19404 7ff75a11b188 16527->19404 16528->16418 16532 7ff75a10ca59 16531->16532 16532->16426 16535 7ff75a10c731 16533->16535 16534 7ff75a10c4f0 16534->16417 16535->16534 16536 7ff75a10d1c0 7 API calls 16535->16536 16536->16534 16538 7ff75a10c8e2 _wfindfirst32i64 __scrt_get_show_window_mode 16537->16538 16539 7ff75a10c901 RtlCaptureContext RtlLookupFunctionEntry 16538->16539 16540 7ff75a10c92a RtlVirtualUnwind 16539->16540 16541 7ff75a10c966 __scrt_get_show_window_mode 16539->16541 16540->16541 16542 7ff75a10c998 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16541->16542 16543 7ff75a10c9e6 _wfindfirst32i64 16542->16543 16543->16412 16545 7ff75a10d1c8 16544->16545 16546 7ff75a10d1d2 16544->16546 16550 7ff75a10d564 16545->16550 16546->16432 16551 7ff75a10d1cd 16550->16551 16552 7ff75a10d573 16550->16552 16554 7ff75a10d5d0 16551->16554 16558 7ff75a10e560 16552->16558 16555 7ff75a10d5fb 16554->16555 16556 7ff75a10d5de DeleteCriticalSection 16555->16556 16557 7ff75a10d5ff 16555->16557 16556->16555 16557->16546 16562 7ff75a10e3c8 16558->16562 16563 7ff75a10e4b2 TlsFree 16562->16563 16568 7ff75a10e40c __vcrt_InitializeCriticalSectionEx 16562->16568 16564 7ff75a10e43a LoadLibraryExW 16566 7ff75a10e4d9 16564->16566 16567 7ff75a10e45b GetLastError 16564->16567 16565 7ff75a10e4f9 GetProcAddress 16565->16563 16566->16565 16569 7ff75a10e4f0 FreeLibrary 16566->16569 16567->16568 16568->16563 16568->16564 16568->16565 16570 7ff75a10e47d LoadLibraryExW 16568->16570 16569->16565 16570->16566 16570->16568 16572 7ff75a10ca1b GetStartupInfoW 16571->16572 16572->16420 16574 7ff75a1089cf 16573->16574 16575 7ff75a108a20 WideCharToMultiByte 16574->16575 16576 7ff75a1089d7 __vcrt_freefls 16574->16576 16577 7ff75a108ac6 16574->16577 16579 7ff75a108a74 WideCharToMultiByte 16574->16579 16575->16574 16575->16577 16576->16441 16869 7ff75a1029c0 16577->16869 16579->16574 16579->16577 16583 7ff75a120840 16580->16583 16581 7ff75a120893 16582 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 16581->16582 16586 7ff75a1208bc 16582->16586 16583->16581 16584 7ff75a1208e6 16583->16584 17266 7ff75a120718 16584->17266 16586->16443 16588 7ff75a101eb5 16587->16588 16589 7ff75a101ed0 16588->16589 17274 7ff75a102870 16588->17274 16589->16446 16591 7ff75a103f00 16589->16591 16592 7ff75a10bfb0 16591->16592 16593 7ff75a103f0c GetModuleFileNameW 16592->16593 16594 7ff75a103f55 16593->16594 16595 7ff75a103f3e 16593->16595 17314 7ff75a108ef0 16594->17314 16596 7ff75a1029c0 57 API calls 16595->16596 16606 7ff75a103f51 16596->16606 16599 7ff75a103f80 17325 7ff75a1040e0 16599->17325 16600 7ff75a103f70 16603 7ff75a102b10 59 API calls 16600->16603 16602 7ff75a10c010 _wfindfirst32i64 8 API calls 16605 7ff75a103fd9 16602->16605 16603->16606 16605->16450 16606->16602 16607 7ff75a101ee0 49 API calls 16608 7ff75a103fa5 16607->16608 16608->16606 16609 7ff75a103fac 16608->16609 17333 7ff75a104340 16609->17333 16613 7ff75a107d7a 16612->16613 16614 7ff75a108de0 57 API calls 16613->16614 16615 7ff75a107d9c GetEnvironmentVariableW 16614->16615 16616 7ff75a107e06 16615->16616 16617 7ff75a107db4 ExpandEnvironmentStringsW 16615->16617 16619 7ff75a10c010 _wfindfirst32i64 8 API calls 16616->16619 16618 7ff75a108ef0 59 API calls 16617->16618 16621 7ff75a107ddc 16618->16621 16620 7ff75a107e18 16619->16620 16620->16452 16621->16616 16622 7ff75a107de6 16621->16622 17348 7ff75a11b1bc 16622->17348 16625 7ff75a10c010 _wfindfirst32i64 8 API calls 16626 7ff75a107dfe 16625->16626 16626->16452 16628 7ff75a108de0 57 API calls 16627->16628 16629 7ff75a108267 SetEnvironmentVariableW 16628->16629 16630 7ff75a10827f __vcrt_freefls 16629->16630 16630->16456 16632 7ff75a101cae 16631->16632 16633 7ff75a101ee0 49 API calls 16632->16633 16634 7ff75a101ce4 16633->16634 16635 7ff75a101ee0 49 API calls 16634->16635 16644 7ff75a101dce 16634->16644 16637 7ff75a101d0a 16635->16637 16636 7ff75a10c010 _wfindfirst32i64 8 API calls 16638 7ff75a101e5c 16636->16638 16637->16644 17355 7ff75a101a90 16637->17355 16638->16460 16638->16461 16642 7ff75a101dbc 16643 7ff75a103e80 49 API calls 16642->16643 16643->16644 16644->16636 16645 7ff75a101d7f 16645->16642 16646 7ff75a101e24 16645->16646 16647 7ff75a103e80 49 API calls 16646->16647 16648 7ff75a101e31 16647->16648 17391 7ff75a104140 16648->17391 16651 7ff75a108b95 16650->16651 17433 7ff75a108860 GetCurrentProcess OpenProcessToken 16651->17433 16654 7ff75a108860 7 API calls 16655 7ff75a108bc1 16654->16655 16656 7ff75a108bda 16655->16656 16657 7ff75a108bf4 16655->16657 17443 7ff75a108950 16656->17443 16658 7ff75a108950 48 API calls 16657->16658 16661 7ff75a108c07 LocalFree LocalFree 16658->16661 16662 7ff75a108c23 16661->16662 16664 7ff75a108c2f 16661->16664 17447 7ff75a102c30 16662->17447 16665 7ff75a10c010 _wfindfirst32i64 8 API calls 16664->16665 16666 7ff75a103b4e 16665->16666 16666->16475 16667 7ff75a1014e0 16666->16667 16668 7ff75a10156f 16667->16668 16669 7ff75a1014f6 16667->16669 16668->16462 17654 7ff75a107b60 16669->17654 16675 7ff75a108e87 MultiByteToWideChar 16674->16675 16676 7ff75a108e01 MultiByteToWideChar 16674->16676 16677 7ff75a108eaa 16675->16677 16678 7ff75a108ecf 16675->16678 16679 7ff75a108e27 16676->16679 16680 7ff75a108e4c 16676->16680 16681 7ff75a1029c0 55 API calls 16677->16681 16678->16471 16682 7ff75a1029c0 55 API calls 16679->16682 16680->16675 16685 7ff75a108e62 16680->16685 16683 7ff75a108ebd 16681->16683 16684 7ff75a108e3a 16682->16684 16683->16471 16684->16471 16686 7ff75a1029c0 55 API calls 16685->16686 16687 7ff75a108e75 16686->16687 16687->16471 16689 7ff75a107005 16688->16689 16690 7ff75a102870 59 API calls 16689->16690 16691 7ff75a103be0 16689->16691 16690->16691 16691->16479 16786 7ff75a106ca0 16691->16786 16696 7ff75a103513 16692->16696 16698 7ff75a103554 16692->16698 16693 7ff75a10c010 _wfindfirst32i64 8 API calls 16694 7ff75a1035a5 16693->16694 16694->16446 16699 7ff75a108b50 LocalFree 16694->16699 16696->16698 17986 7ff75a101700 16696->17986 18028 7ff75a102d50 16696->18028 16698->16693 16699->16504 16701 7ff75a108de0 57 API calls 16700->16701 16702 7ff75a1081ff 16701->16702 16703 7ff75a108de0 57 API calls 16702->16703 16704 7ff75a10820f 16703->16704 16705 7ff75a118610 38 API calls 16704->16705 16706 7ff75a10821d __vcrt_freefls 16705->16706 16706->16509 16751 7ff75a102b30 16750->16751 16752 7ff75a1152b4 49 API calls 16751->16752 16753 7ff75a102b7b __scrt_get_show_window_mode 16752->16753 16754 7ff75a108de0 57 API calls 16753->16754 16755 7ff75a102bb0 16754->16755 16756 7ff75a102bb5 16755->16756 16757 7ff75a102bed MessageBoxA 16755->16757 16758 7ff75a108de0 57 API calls 16756->16758 16759 7ff75a102c07 16757->16759 16760 7ff75a102bcf MessageBoxW 16758->16760 16761 7ff75a10c010 _wfindfirst32i64 8 API calls 16759->16761 16760->16759 16762 7ff75a102c17 16761->16762 16762->16446 16764 7ff75a10406c 16763->16764 16765 7ff75a108de0 57 API calls 16764->16765 16766 7ff75a104097 16765->16766 16767 7ff75a108de0 57 API calls 16766->16767 16768 7ff75a1040aa 16767->16768 18562 7ff75a1169e4 16768->18562 16771 7ff75a10c010 _wfindfirst32i64 8 API calls 16772 7ff75a103acd 16771->16772 16772->16481 16773 7ff75a1084c0 16772->16773 16774 7ff75a1084e4 16773->16774 16775 7ff75a111004 73 API calls 16774->16775 16780 7ff75a1085bb __vcrt_freefls 16774->16780 16776 7ff75a1084fe 16775->16776 16776->16780 18941 7ff75a119894 16776->18941 16780->16486 16783 7ff75a1109ac 16782->16783 18956 7ff75a110758 16783->18956 16787 7ff75a106cc3 16786->16787 16788 7ff75a106cda 16786->16788 16787->16788 18967 7ff75a101590 16787->18967 16788->16485 16790 7ff75a106ce4 16790->16788 16791 7ff75a104140 49 API calls 16790->16791 16792 7ff75a106d45 16791->16792 16793 7ff75a102b10 59 API calls 16792->16793 16794 7ff75a106db5 memcpy_s __vcrt_freefls 16792->16794 16793->16788 16794->16485 16801 7ff75a10681a memcpy_s 16795->16801 16796 7ff75a10693f 16798 7ff75a104140 49 API calls 16796->16798 16803 7ff75a1069b8 16798->16803 16799 7ff75a10695b 16800 7ff75a102b10 59 API calls 16799->16800 16804 7ff75a106951 __vcrt_freefls 16800->16804 16801->16796 16801->16799 16801->16801 16802 7ff75a104140 49 API calls 16801->16802 16805 7ff75a106920 16801->16805 16812 7ff75a101700 135 API calls 16801->16812 16813 7ff75a106941 16801->16813 18991 7ff75a101940 16801->18991 16802->16801 16806 7ff75a104140 49 API calls 16803->16806 16809 7ff75a10c010 _wfindfirst32i64 8 API calls 16804->16809 16805->16796 16807 7ff75a104140 49 API calls 16805->16807 16808 7ff75a1069e8 16806->16808 16807->16796 16811 7ff75a104140 49 API calls 16808->16811 16810 7ff75a103c06 16809->16810 16810->16497 16815 7ff75a106780 16810->16815 16811->16804 16812->16801 16814 7ff75a102b10 59 API calls 16813->16814 16814->16804 18995 7ff75a108470 16815->18995 16817 7ff75a10679c 16818 7ff75a108470 58 API calls 16817->16818 16819 7ff75a1067af 16818->16819 16820 7ff75a1067e5 16819->16820 16821 7ff75a1067c7 16819->16821 16832 7ff75a101f05 16831->16832 16833 7ff75a1152b4 49 API calls 16832->16833 16834 7ff75a101f28 16833->16834 16834->16495 19058 7ff75a105dd0 16835->19058 16838 7ff75a10348d 16838->16512 16888 7ff75a10bfb0 16869->16888 16872 7ff75a102a09 16890 7ff75a1152b4 16872->16890 16877 7ff75a101ee0 49 API calls 16878 7ff75a102a66 __scrt_get_show_window_mode 16877->16878 16879 7ff75a108de0 54 API calls 16878->16879 16880 7ff75a102a9b 16879->16880 16881 7ff75a102aa0 16880->16881 16882 7ff75a102ad8 MessageBoxA 16880->16882 16883 7ff75a108de0 54 API calls 16881->16883 16884 7ff75a102af2 16882->16884 16886 7ff75a102aba MessageBoxW 16883->16886 16885 7ff75a10c010 _wfindfirst32i64 8 API calls 16884->16885 16887 7ff75a102b02 16885->16887 16886->16884 16887->16576 16889 7ff75a1029dc GetLastError 16888->16889 16889->16872 16891 7ff75a11530e 16890->16891 16892 7ff75a115333 16891->16892 16894 7ff75a11536f 16891->16894 16893 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 16892->16893 16896 7ff75a11535d 16893->16896 16920 7ff75a113540 16894->16920 16898 7ff75a10c010 _wfindfirst32i64 8 API calls 16896->16898 16897 7ff75a11544c 16899 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16897->16899 16900 7ff75a102a37 16898->16900 16899->16896 16908 7ff75a108770 16900->16908 16902 7ff75a115421 16904 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16902->16904 16903 7ff75a115470 16903->16897 16906 7ff75a11547a 16903->16906 16904->16896 16905 7ff75a115418 16905->16897 16905->16902 16907 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16906->16907 16907->16896 16909 7ff75a10877c 16908->16909 16910 7ff75a108797 GetLastError 16909->16910 16911 7ff75a10879d FormatMessageW 16909->16911 16910->16911 16912 7ff75a1087ec WideCharToMultiByte 16911->16912 16913 7ff75a1087d0 16911->16913 16915 7ff75a1087e3 16912->16915 16916 7ff75a108826 16912->16916 16914 7ff75a1029c0 54 API calls 16913->16914 16914->16915 16918 7ff75a10c010 _wfindfirst32i64 8 API calls 16915->16918 16917 7ff75a1029c0 54 API calls 16916->16917 16917->16915 16919 7ff75a102a3e 16918->16919 16919->16877 16921 7ff75a11357e 16920->16921 16922 7ff75a11356e 16920->16922 16923 7ff75a113587 16921->16923 16924 7ff75a1135b5 16921->16924 16926 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 16922->16926 16927 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 16923->16927 16924->16922 16925 7ff75a1135ad 16924->16925 16930 7ff75a113864 16924->16930 16934 7ff75a113ed0 16924->16934 16960 7ff75a113b98 16924->16960 16990 7ff75a113420 16924->16990 16993 7ff75a1150f0 16924->16993 16925->16897 16925->16902 16925->16903 16925->16905 16926->16925 16927->16925 16932 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 16930->16932 16932->16922 16935 7ff75a113f12 16934->16935 16936 7ff75a113f85 16934->16936 16937 7ff75a113f18 16935->16937 16938 7ff75a113faf 16935->16938 16939 7ff75a113f8a 16936->16939 16940 7ff75a113fdf 16936->16940 16947 7ff75a113f1d 16937->16947 16951 7ff75a113fee 16937->16951 17017 7ff75a112480 16938->17017 16941 7ff75a113f8c 16939->16941 16942 7ff75a113fbf 16939->16942 16940->16938 16940->16951 16958 7ff75a113f48 16940->16958 16944 7ff75a113f2d 16941->16944 16950 7ff75a113f9b 16941->16950 17024 7ff75a112070 16942->17024 16959 7ff75a11401d 16944->16959 16999 7ff75a114834 16944->16999 16947->16944 16949 7ff75a113f60 16947->16949 16947->16958 16949->16959 17009 7ff75a114cf0 16949->17009 16950->16938 16953 7ff75a113fa0 16950->16953 16951->16959 17031 7ff75a112890 16951->17031 16953->16959 17013 7ff75a114e88 16953->17013 16954 7ff75a10c010 _wfindfirst32i64 8 API calls 16956 7ff75a1142b3 16954->16956 16956->16924 16958->16959 17038 7ff75a11f608 16958->17038 16959->16954 16961 7ff75a113bb9 16960->16961 16962 7ff75a113ba3 16960->16962 16963 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 16961->16963 16966 7ff75a113bf7 16961->16966 16964 7ff75a113f12 16962->16964 16965 7ff75a113f85 16962->16965 16962->16966 16963->16966 16967 7ff75a113f18 16964->16967 16968 7ff75a113faf 16964->16968 16969 7ff75a113f8a 16965->16969 16970 7ff75a113fdf 16965->16970 16966->16924 16976 7ff75a113f1d 16967->16976 16978 7ff75a113fee 16967->16978 16973 7ff75a112480 38 API calls 16968->16973 16971 7ff75a113f8c 16969->16971 16972 7ff75a113fbf 16969->16972 16970->16968 16970->16978 16988 7ff75a113f48 16970->16988 16980 7ff75a113f9b 16971->16980 16983 7ff75a113f2d 16971->16983 16974 7ff75a112070 38 API calls 16972->16974 16973->16988 16974->16988 16975 7ff75a114834 47 API calls 16975->16988 16977 7ff75a113f60 16976->16977 16976->16983 16976->16988 16981 7ff75a114cf0 47 API calls 16977->16981 16989 7ff75a11401d 16977->16989 16979 7ff75a112890 38 API calls 16978->16979 16978->16989 16979->16988 16980->16968 16982 7ff75a113fa0 16980->16982 16981->16988 16985 7ff75a114e88 37 API calls 16982->16985 16982->16989 16983->16975 16983->16989 16984 7ff75a10c010 _wfindfirst32i64 8 API calls 16986 7ff75a1142b3 16984->16986 16985->16988 16986->16924 16987 7ff75a11f608 47 API calls 16987->16988 16988->16987 16988->16989 16989->16984 17194 7ff75a111644 16990->17194 16994 7ff75a115107 16993->16994 17211 7ff75a11e768 16994->17211 17000 7ff75a114856 16999->17000 17048 7ff75a1114b0 17000->17048 17005 7ff75a1150f0 45 API calls 17008 7ff75a114993 17005->17008 17006 7ff75a114a1c 17006->16958 17006->17006 17007 7ff75a1150f0 45 API calls 17007->17006 17008->17006 17008->17007 17008->17008 17010 7ff75a114d70 17009->17010 17011 7ff75a114d08 17009->17011 17010->16958 17011->17010 17012 7ff75a11f608 47 API calls 17011->17012 17012->17010 17014 7ff75a114ea9 17013->17014 17015 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17014->17015 17016 7ff75a114eda 17014->17016 17015->17016 17016->16958 17018 7ff75a1124b3 17017->17018 17019 7ff75a1124e2 17018->17019 17021 7ff75a11259f 17018->17021 17020 7ff75a1114b0 12 API calls 17019->17020 17023 7ff75a11251f 17019->17023 17020->17023 17022 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17021->17022 17022->17023 17023->16958 17025 7ff75a1120a3 17024->17025 17026 7ff75a1120d2 17025->17026 17028 7ff75a11218f 17025->17028 17027 7ff75a1114b0 12 API calls 17026->17027 17030 7ff75a11210f 17026->17030 17027->17030 17029 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17028->17029 17029->17030 17030->16958 17032 7ff75a1128c3 17031->17032 17033 7ff75a1128f2 17032->17033 17035 7ff75a1129af 17032->17035 17034 7ff75a1114b0 12 API calls 17033->17034 17037 7ff75a11292f 17033->17037 17034->17037 17036 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17035->17036 17036->17037 17037->16958 17039 7ff75a11f630 17038->17039 17040 7ff75a11f675 17039->17040 17041 7ff75a1150f0 45 API calls 17039->17041 17043 7ff75a11f65e __scrt_get_show_window_mode 17039->17043 17044 7ff75a11f635 __scrt_get_show_window_mode 17039->17044 17040->17043 17040->17044 17191 7ff75a121640 17040->17191 17041->17040 17042 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17042->17044 17043->17042 17043->17044 17044->16958 17049 7ff75a1114e7 17048->17049 17050 7ff75a1114d6 17048->17050 17049->17050 17078 7ff75a11e3ac 17049->17078 17056 7ff75a11f320 17050->17056 17053 7ff75a111528 17055 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17053->17055 17054 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17054->17053 17055->17050 17057 7ff75a11f33d 17056->17057 17058 7ff75a11f370 17056->17058 17059 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17057->17059 17058->17057 17060 7ff75a11f3a2 17058->17060 17069 7ff75a114971 17059->17069 17067 7ff75a11f4b5 17060->17067 17073 7ff75a11f3ea 17060->17073 17061 7ff75a11f5a7 17118 7ff75a11e80c 17061->17118 17063 7ff75a11f56d 17111 7ff75a11eba4 17063->17111 17065 7ff75a11f53c 17104 7ff75a11ee84 17065->17104 17067->17061 17067->17063 17067->17065 17068 7ff75a11f4ff 17067->17068 17070 7ff75a11f4f5 17067->17070 17094 7ff75a11f0b4 17068->17094 17069->17005 17069->17008 17070->17063 17072 7ff75a11f4fa 17070->17072 17072->17065 17072->17068 17073->17069 17085 7ff75a11b25c 17073->17085 17076 7ff75a11b6b8 _wfindfirst32i64 17 API calls 17077 7ff75a11f604 17076->17077 17079 7ff75a11e3f7 17078->17079 17083 7ff75a11e3bb _wfindfirst32i64 17078->17083 17080 7ff75a115cb4 _wfindfirst32i64 11 API calls 17079->17080 17082 7ff75a111514 17080->17082 17081 7ff75a11e3de RtlAllocateHeap 17081->17082 17081->17083 17082->17053 17082->17054 17083->17079 17083->17081 17084 7ff75a1243e0 _wfindfirst32i64 2 API calls 17083->17084 17084->17083 17086 7ff75a11b269 17085->17086 17087 7ff75a11b273 17085->17087 17086->17087 17092 7ff75a11b28e 17086->17092 17088 7ff75a115cb4 _wfindfirst32i64 11 API calls 17087->17088 17089 7ff75a11b27a 17088->17089 17091 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17089->17091 17090 7ff75a11b286 17090->17069 17090->17076 17091->17090 17092->17090 17093 7ff75a115cb4 _wfindfirst32i64 11 API calls 17092->17093 17093->17089 17127 7ff75a124efc 17094->17127 17098 7ff75a11f160 17098->17069 17099 7ff75a11f1b1 17180 7ff75a11eca0 17099->17180 17100 7ff75a11f15c 17100->17098 17100->17099 17102 7ff75a11f17c 17100->17102 17176 7ff75a11ef5c 17102->17176 17105 7ff75a124efc 38 API calls 17104->17105 17106 7ff75a11eece 17105->17106 17107 7ff75a124944 37 API calls 17106->17107 17108 7ff75a11ef1e 17107->17108 17109 7ff75a11ef22 17108->17109 17110 7ff75a11ef5c 45 API calls 17108->17110 17109->17069 17110->17109 17112 7ff75a124efc 38 API calls 17111->17112 17113 7ff75a11ebef 17112->17113 17114 7ff75a124944 37 API calls 17113->17114 17115 7ff75a11ec47 17114->17115 17116 7ff75a11ec4b 17115->17116 17117 7ff75a11eca0 45 API calls 17115->17117 17116->17069 17117->17116 17119 7ff75a11e851 17118->17119 17120 7ff75a11e884 17118->17120 17122 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17119->17122 17121 7ff75a11e89c 17120->17121 17125 7ff75a11e91d 17120->17125 17123 7ff75a11eba4 46 API calls 17121->17123 17124 7ff75a11e87d __scrt_get_show_window_mode 17122->17124 17123->17124 17124->17069 17125->17124 17126 7ff75a1150f0 45 API calls 17125->17126 17126->17124 17128 7ff75a124f4f fegetenv 17127->17128 17129 7ff75a128e5c 37 API calls 17128->17129 17134 7ff75a124fa2 17129->17134 17130 7ff75a125092 17131 7ff75a128e5c 37 API calls 17130->17131 17132 7ff75a1250bc 17131->17132 17136 7ff75a128e5c 37 API calls 17132->17136 17133 7ff75a11b25c __std_exception_copy 37 API calls 17144 7ff75a12504d 17133->17144 17134->17130 17135 7ff75a12506c 17134->17135 17141 7ff75a124fbd 17134->17141 17140 7ff75a11b25c __std_exception_copy 37 API calls 17135->17140 17138 7ff75a1250cd 17136->17138 17137 7ff75a124fcf 17137->17133 17142 7ff75a129050 20 API calls 17138->17142 17139 7ff75a126174 17143 7ff75a11b6b8 _wfindfirst32i64 17 API calls 17139->17143 17140->17144 17141->17130 17141->17137 17154 7ff75a125136 __scrt_get_show_window_mode 17142->17154 17145 7ff75a126189 17143->17145 17144->17139 17146 7ff75a125055 17144->17146 17147 7ff75a10c010 _wfindfirst32i64 8 API calls 17146->17147 17148 7ff75a11f101 17147->17148 17172 7ff75a124944 17148->17172 17149 7ff75a1254df __scrt_get_show_window_mode 17150 7ff75a12581f 17151 7ff75a124a60 37 API calls 17150->17151 17158 7ff75a125f37 17151->17158 17152 7ff75a1257cb 17152->17150 17155 7ff75a12618c memcpy_s 37 API calls 17152->17155 17153 7ff75a125177 memcpy_s 17165 7ff75a125abb memcpy_s __scrt_get_show_window_mode 17153->17165 17166 7ff75a1255d3 memcpy_s __scrt_get_show_window_mode 17153->17166 17154->17149 17154->17153 17156 7ff75a115cb4 _wfindfirst32i64 11 API calls 17154->17156 17155->17150 17157 7ff75a1255b0 17156->17157 17159 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17157->17159 17161 7ff75a12618c memcpy_s 37 API calls 17158->17161 17171 7ff75a125f92 17158->17171 17159->17153 17160 7ff75a126118 17162 7ff75a128e5c 37 API calls 17160->17162 17161->17171 17162->17146 17163 7ff75a115cb4 11 API calls _wfindfirst32i64 17163->17166 17164 7ff75a115cb4 11 API calls _wfindfirst32i64 17164->17165 17165->17150 17165->17152 17165->17164 17168 7ff75a11b698 37 API calls _invalid_parameter_noinfo 17165->17168 17166->17152 17166->17163 17169 7ff75a11b698 37 API calls _invalid_parameter_noinfo 17166->17169 17167 7ff75a124a60 37 API calls 17167->17171 17168->17165 17169->17166 17170 7ff75a12618c memcpy_s 37 API calls 17170->17171 17171->17160 17171->17167 17171->17170 17173 7ff75a124963 17172->17173 17174 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17173->17174 17175 7ff75a12498e memcpy_s 17173->17175 17174->17175 17175->17100 17178 7ff75a11ef88 memcpy_s 17176->17178 17177 7ff75a11f042 memcpy_s __scrt_get_show_window_mode 17177->17098 17178->17177 17179 7ff75a1150f0 45 API calls 17178->17179 17179->17177 17181 7ff75a11ed28 memcpy_s 17180->17181 17182 7ff75a11ecdb 17180->17182 17185 7ff75a11ed93 17181->17185 17187 7ff75a1150f0 45 API calls 17181->17187 17183 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17182->17183 17184 7ff75a11ed07 17183->17184 17184->17098 17186 7ff75a11b25c __std_exception_copy 37 API calls 17185->17186 17190 7ff75a11edd5 memcpy_s 17186->17190 17187->17185 17188 7ff75a11b6b8 _wfindfirst32i64 17 API calls 17189 7ff75a11ee80 17188->17189 17190->17188 17192 7ff75a121664 WideCharToMultiByte 17191->17192 17195 7ff75a111671 17194->17195 17196 7ff75a111683 17194->17196 17197 7ff75a115cb4 _wfindfirst32i64 11 API calls 17195->17197 17198 7ff75a111690 17196->17198 17202 7ff75a1116cd 17196->17202 17199 7ff75a111676 17197->17199 17200 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17198->17200 17201 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17199->17201 17203 7ff75a111681 17200->17203 17201->17203 17204 7ff75a111776 17202->17204 17205 7ff75a115cb4 _wfindfirst32i64 11 API calls 17202->17205 17203->16924 17204->17203 17206 7ff75a115cb4 _wfindfirst32i64 11 API calls 17204->17206 17207 7ff75a11176b 17205->17207 17208 7ff75a111820 17206->17208 17209 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17207->17209 17210 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17208->17210 17209->17204 17210->17203 17212 7ff75a11512f 17211->17212 17213 7ff75a11e781 17211->17213 17215 7ff75a11e7d4 17212->17215 17213->17212 17219 7ff75a124154 17213->17219 17216 7ff75a11e7ed 17215->17216 17217 7ff75a11513f 17215->17217 17216->17217 17263 7ff75a1234a0 17216->17263 17217->16924 17231 7ff75a11bf00 GetLastError 17219->17231 17222 7ff75a1241ae 17222->17212 17232 7ff75a11bf41 FlsSetValue 17231->17232 17233 7ff75a11bf24 FlsGetValue 17231->17233 17235 7ff75a11bf53 17232->17235 17250 7ff75a11bf31 17232->17250 17234 7ff75a11bf3b 17233->17234 17233->17250 17234->17232 17237 7ff75a11f948 _wfindfirst32i64 11 API calls 17235->17237 17236 7ff75a11bfad SetLastError 17238 7ff75a11bfba 17236->17238 17239 7ff75a11bfcd 17236->17239 17240 7ff75a11bf62 17237->17240 17238->17222 17253 7ff75a1211a8 EnterCriticalSection 17238->17253 17254 7ff75a11b2bc 17239->17254 17242 7ff75a11bf80 FlsSetValue 17240->17242 17243 7ff75a11bf70 FlsSetValue 17240->17243 17244 7ff75a11bf8c FlsSetValue 17242->17244 17245 7ff75a11bf9e 17242->17245 17247 7ff75a11bf79 17243->17247 17244->17247 17249 7ff75a11bcac _wfindfirst32i64 11 API calls 17245->17249 17248 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17247->17248 17248->17250 17251 7ff75a11bfa6 17249->17251 17250->17236 17252 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17251->17252 17252->17236 17255 7ff75a1244a0 __FrameHandler3::FrameUnwindToEmptyState EnterCriticalSection LeaveCriticalSection 17254->17255 17256 7ff75a11b2c5 17255->17256 17257 7ff75a11b2d4 17256->17257 17258 7ff75a1244f0 __FrameHandler3::FrameUnwindToEmptyState 44 API calls 17256->17258 17259 7ff75a11b307 __FrameHandler3::FrameUnwindToEmptyState 17257->17259 17260 7ff75a11b2dd IsProcessorFeaturePresent 17257->17260 17258->17257 17261 7ff75a11b2ec 17260->17261 17262 7ff75a11b3cc _wfindfirst32i64 14 API calls 17261->17262 17262->17259 17264 7ff75a11bf00 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 17263->17264 17265 7ff75a1234a9 17264->17265 17273 7ff75a115b5c EnterCriticalSection 17266->17273 17275 7ff75a10288c 17274->17275 17276 7ff75a1152b4 49 API calls 17275->17276 17277 7ff75a1028dd 17276->17277 17278 7ff75a115cb4 _wfindfirst32i64 11 API calls 17277->17278 17279 7ff75a1028e2 17278->17279 17293 7ff75a115cd4 17279->17293 17282 7ff75a101ee0 49 API calls 17283 7ff75a102911 __scrt_get_show_window_mode 17282->17283 17284 7ff75a108de0 57 API calls 17283->17284 17285 7ff75a102946 17284->17285 17286 7ff75a102983 MessageBoxA 17285->17286 17287 7ff75a10294b 17285->17287 17289 7ff75a10299d 17286->17289 17288 7ff75a108de0 57 API calls 17287->17288 17290 7ff75a102965 MessageBoxW 17288->17290 17291 7ff75a10c010 _wfindfirst32i64 8 API calls 17289->17291 17290->17289 17292 7ff75a1029ad 17291->17292 17292->16589 17294 7ff75a11c078 _wfindfirst32i64 11 API calls 17293->17294 17295 7ff75a115ceb 17294->17295 17296 7ff75a11f948 _wfindfirst32i64 11 API calls 17295->17296 17298 7ff75a115d2b 17295->17298 17302 7ff75a1028e9 17295->17302 17297 7ff75a115d20 17296->17297 17299 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17297->17299 17298->17302 17305 7ff75a120018 17298->17305 17299->17298 17302->17282 17303 7ff75a11b6b8 _wfindfirst32i64 17 API calls 17304 7ff75a115d70 17303->17304 17310 7ff75a120035 17305->17310 17306 7ff75a12003a 17307 7ff75a115d51 17306->17307 17308 7ff75a115cb4 _wfindfirst32i64 11 API calls 17306->17308 17307->17302 17307->17303 17309 7ff75a120044 17308->17309 17311 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17309->17311 17310->17306 17310->17307 17312 7ff75a120084 17310->17312 17311->17307 17312->17307 17313 7ff75a115cb4 _wfindfirst32i64 11 API calls 17312->17313 17313->17309 17315 7ff75a108f82 WideCharToMultiByte 17314->17315 17316 7ff75a108f14 WideCharToMultiByte 17314->17316 17319 7ff75a108faf 17315->17319 17324 7ff75a103f6b 17315->17324 17317 7ff75a108f3e 17316->17317 17318 7ff75a108f55 17316->17318 17320 7ff75a1029c0 57 API calls 17317->17320 17318->17315 17322 7ff75a108f6b 17318->17322 17321 7ff75a1029c0 57 API calls 17319->17321 17320->17324 17321->17324 17323 7ff75a1029c0 57 API calls 17322->17323 17323->17324 17324->16599 17324->16600 17326 7ff75a1040ea 17325->17326 17327 7ff75a108de0 57 API calls 17326->17327 17328 7ff75a104112 17327->17328 17343 7ff75a108d00 FindFirstFileExW 17328->17343 17331 7ff75a10c010 _wfindfirst32i64 8 API calls 17332 7ff75a103f88 17331->17332 17332->16606 17332->16607 17334 7ff75a104352 17333->17334 17335 7ff75a108de0 57 API calls 17334->17335 17336 7ff75a104380 CreateFileW 17335->17336 17337 7ff75a1043b7 GetFinalPathNameByHandleW CloseHandle 17336->17337 17342 7ff75a10441f 17336->17342 17338 7ff75a1043e3 __vcrt_InitializeCriticalSectionEx 17337->17338 17337->17342 17340 7ff75a108ef0 59 API calls 17338->17340 17339 7ff75a10c010 _wfindfirst32i64 8 API calls 17341 7ff75a103fb9 17339->17341 17340->17342 17341->16606 17342->17339 17344 7ff75a108d3d FindClose 17343->17344 17345 7ff75a108d50 17343->17345 17344->17345 17346 7ff75a10c010 _wfindfirst32i64 8 API calls 17345->17346 17347 7ff75a10411c 17346->17347 17347->17331 17349 7ff75a11b1d3 17348->17349 17352 7ff75a107dee 17348->17352 17350 7ff75a11b25c __std_exception_copy 37 API calls 17349->17350 17349->17352 17351 7ff75a11b200 17350->17351 17351->17352 17353 7ff75a11b6b8 _wfindfirst32i64 17 API calls 17351->17353 17352->16625 17354 7ff75a11b230 17353->17354 17356 7ff75a104060 116 API calls 17355->17356 17357 7ff75a101ac6 17356->17357 17358 7ff75a101c74 17357->17358 17360 7ff75a1084c0 83 API calls 17357->17360 17359 7ff75a10c010 _wfindfirst32i64 8 API calls 17358->17359 17362 7ff75a101c88 17359->17362 17361 7ff75a101afe 17360->17361 17386 7ff75a101b2f 17361->17386 17394 7ff75a111004 17361->17394 17362->16644 17388 7ff75a103e80 17362->17388 17364 7ff75a11097c 74 API calls 17364->17358 17365 7ff75a101b18 17366 7ff75a101b34 17365->17366 17367 7ff75a101b1c 17365->17367 17398 7ff75a110ccc 17366->17398 17368 7ff75a102870 59 API calls 17367->17368 17368->17386 17371 7ff75a101b4f 17373 7ff75a102870 59 API calls 17371->17373 17372 7ff75a101b67 17374 7ff75a111004 73 API calls 17372->17374 17373->17386 17375 7ff75a101bb4 17374->17375 17376 7ff75a101bc6 17375->17376 17377 7ff75a101bde 17375->17377 17378 7ff75a102870 59 API calls 17376->17378 17379 7ff75a110ccc _fread_nolock 53 API calls 17377->17379 17378->17386 17380 7ff75a101bf3 17379->17380 17381 7ff75a101c0e 17380->17381 17382 7ff75a101bf9 17380->17382 17401 7ff75a110a40 17381->17401 17383 7ff75a102870 59 API calls 17382->17383 17383->17386 17386->17364 17389 7ff75a101ee0 49 API calls 17388->17389 17390 7ff75a103e9d 17389->17390 17390->16645 17392 7ff75a101ee0 49 API calls 17391->17392 17393 7ff75a104170 17392->17393 17393->16644 17395 7ff75a111034 17394->17395 17407 7ff75a110d94 17395->17407 17397 7ff75a11104d 17397->17365 17419 7ff75a110cec 17398->17419 17402 7ff75a110a49 17401->17402 17403 7ff75a101c22 17401->17403 17403->17386 17408 7ff75a110dfe 17407->17408 17409 7ff75a110dbe 17407->17409 17408->17409 17411 7ff75a110e0a 17408->17411 17410 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17409->17410 17412 7ff75a110de5 17410->17412 17418 7ff75a115b5c EnterCriticalSection 17411->17418 17412->17397 17420 7ff75a110d16 17419->17420 17421 7ff75a101b49 17419->17421 17420->17421 17422 7ff75a110d62 17420->17422 17423 7ff75a110d25 __scrt_get_show_window_mode 17420->17423 17421->17371 17421->17372 17432 7ff75a115b5c EnterCriticalSection 17422->17432 17426 7ff75a115cb4 _wfindfirst32i64 11 API calls 17423->17426 17428 7ff75a110d3a 17426->17428 17430 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17428->17430 17430->17421 17434 7ff75a10889f GetTokenInformation 17433->17434 17436 7ff75a108921 __vcrt_freefls 17433->17436 17435 7ff75a1088c0 GetLastError 17434->17435 17437 7ff75a1088cb 17434->17437 17435->17436 17435->17437 17438 7ff75a10893a 17436->17438 17439 7ff75a108934 CloseHandle 17436->17439 17437->17436 17440 7ff75a1088e7 GetTokenInformation 17437->17440 17438->16654 17439->17438 17440->17436 17441 7ff75a10890a 17440->17441 17441->17436 17442 7ff75a108914 ConvertSidToStringSidW 17441->17442 17442->17436 17444 7ff75a108975 17443->17444 17460 7ff75a115508 17444->17460 17448 7ff75a102c50 17447->17448 17449 7ff75a1152b4 49 API calls 17448->17449 17450 7ff75a102c9b __scrt_get_show_window_mode 17449->17450 17451 7ff75a108de0 57 API calls 17450->17451 17452 7ff75a102cd0 17451->17452 17453 7ff75a102cd5 17452->17453 17454 7ff75a102d0d MessageBoxA 17452->17454 17455 7ff75a108de0 57 API calls 17453->17455 17456 7ff75a102d27 17454->17456 17457 7ff75a102cef MessageBoxW 17455->17457 17458 7ff75a10c010 _wfindfirst32i64 8 API calls 17456->17458 17457->17456 17459 7ff75a102d37 17458->17459 17459->16664 17462 7ff75a115562 17460->17462 17461 7ff75a115587 17464 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17461->17464 17462->17461 17463 7ff75a1155c3 17462->17463 17478 7ff75a1138c0 17463->17478 17466 7ff75a1155b1 17464->17466 17469 7ff75a10c010 _wfindfirst32i64 8 API calls 17466->17469 17467 7ff75a1156a4 17468 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17467->17468 17468->17466 17471 7ff75a108998 17469->17471 17471->16661 17472 7ff75a115679 17476 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17472->17476 17473 7ff75a1156ca 17473->17467 17475 7ff75a1156d4 17473->17475 17474 7ff75a115670 17474->17467 17474->17472 17477 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17475->17477 17476->17466 17477->17466 17479 7ff75a1138fe 17478->17479 17484 7ff75a1138ee 17478->17484 17480 7ff75a113907 17479->17480 17485 7ff75a113935 17479->17485 17482 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17480->17482 17481 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17483 7ff75a11392d 17481->17483 17482->17483 17483->17467 17483->17472 17483->17473 17483->17474 17484->17481 17485->17483 17485->17484 17489 7ff75a1142d4 17485->17489 17522 7ff75a113d20 17485->17522 17559 7ff75a1134b0 17485->17559 17490 7ff75a114387 17489->17490 17491 7ff75a114316 17489->17491 17494 7ff75a11438c 17490->17494 17495 7ff75a1143e0 17490->17495 17492 7ff75a11431c 17491->17492 17493 7ff75a1143b1 17491->17493 17496 7ff75a114350 17492->17496 17497 7ff75a114321 17492->17497 17578 7ff75a112684 17493->17578 17498 7ff75a11438e 17494->17498 17499 7ff75a1143c1 17494->17499 17501 7ff75a1143f7 17495->17501 17503 7ff75a1143ea 17495->17503 17508 7ff75a1143ef 17495->17508 17504 7ff75a114327 17496->17504 17496->17508 17497->17501 17497->17504 17502 7ff75a114330 17498->17502 17511 7ff75a11439d 17498->17511 17585 7ff75a112274 17499->17585 17592 7ff75a114fdc 17501->17592 17521 7ff75a114420 17502->17521 17562 7ff75a114a88 17502->17562 17503->17493 17503->17508 17504->17502 17509 7ff75a114362 17504->17509 17518 7ff75a11434b 17504->17518 17508->17521 17596 7ff75a112a94 17508->17596 17509->17521 17572 7ff75a114dc4 17509->17572 17511->17493 17513 7ff75a1143a2 17511->17513 17515 7ff75a114e88 37 API calls 17513->17515 17513->17521 17514 7ff75a10c010 _wfindfirst32i64 8 API calls 17516 7ff75a11471a 17514->17516 17515->17518 17516->17485 17517 7ff75a1150f0 45 API calls 17520 7ff75a11460c 17517->17520 17518->17517 17518->17520 17518->17521 17520->17521 17603 7ff75a11f7b8 17520->17603 17521->17514 17523 7ff75a113d2e 17522->17523 17524 7ff75a113d44 17522->17524 17526 7ff75a114387 17523->17526 17527 7ff75a114316 17523->17527 17528 7ff75a113d84 17523->17528 17525 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17524->17525 17524->17528 17525->17528 17531 7ff75a11438c 17526->17531 17532 7ff75a1143e0 17526->17532 17529 7ff75a11431c 17527->17529 17530 7ff75a1143b1 17527->17530 17528->17485 17533 7ff75a114350 17529->17533 17534 7ff75a114321 17529->17534 17537 7ff75a112684 38 API calls 17530->17537 17535 7ff75a11438e 17531->17535 17536 7ff75a1143c1 17531->17536 17538 7ff75a1143f7 17532->17538 17540 7ff75a1143ea 17532->17540 17544 7ff75a1143ef 17532->17544 17541 7ff75a114327 17533->17541 17533->17544 17534->17538 17534->17541 17539 7ff75a114330 17535->17539 17549 7ff75a11439d 17535->17549 17542 7ff75a112274 38 API calls 17536->17542 17545 7ff75a11434b 17537->17545 17546 7ff75a114fdc 45 API calls 17538->17546 17543 7ff75a114a88 47 API calls 17539->17543 17558 7ff75a114420 17539->17558 17540->17530 17540->17544 17541->17539 17541->17545 17547 7ff75a114362 17541->17547 17542->17545 17543->17545 17548 7ff75a112a94 38 API calls 17544->17548 17544->17558 17555 7ff75a1150f0 45 API calls 17545->17555 17557 7ff75a11460c 17545->17557 17545->17558 17546->17545 17550 7ff75a114dc4 46 API calls 17547->17550 17547->17558 17548->17545 17549->17530 17551 7ff75a1143a2 17549->17551 17550->17545 17553 7ff75a114e88 37 API calls 17551->17553 17551->17558 17552 7ff75a10c010 _wfindfirst32i64 8 API calls 17554 7ff75a11471a 17552->17554 17553->17545 17554->17485 17555->17557 17556 7ff75a11f7b8 46 API calls 17556->17557 17557->17556 17557->17558 17558->17552 17637 7ff75a1118f8 17559->17637 17563 7ff75a114aae 17562->17563 17564 7ff75a1114b0 12 API calls 17563->17564 17574 7ff75a114df9 17572->17574 17579 7ff75a1126b7 17578->17579 17580 7ff75a1126e6 17579->17580 17582 7ff75a1127a3 17579->17582 17584 7ff75a112723 17580->17584 17615 7ff75a111558 17580->17615 17583 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17582->17583 17583->17584 17584->17518 17586 7ff75a1122a7 17585->17586 17587 7ff75a1122d6 17586->17587 17589 7ff75a112393 17586->17589 17588 7ff75a111558 12 API calls 17587->17588 17591 7ff75a112313 17587->17591 17588->17591 17590 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17589->17590 17590->17591 17591->17518 17593 7ff75a11501f 17592->17593 17595 7ff75a115023 __crtLCMapStringW 17593->17595 17623 7ff75a115078 17593->17623 17595->17518 17597 7ff75a112ac7 17596->17597 17598 7ff75a112af6 17597->17598 17600 7ff75a112bb3 17597->17600 17599 7ff75a111558 12 API calls 17598->17599 17602 7ff75a112b33 17598->17602 17599->17602 17601 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17600->17601 17601->17602 17602->17518 17616 7ff75a11158f 17615->17616 17622 7ff75a11157e 17615->17622 17616->17622 17622->17584 17624 7ff75a115096 17623->17624 17626 7ff75a11509e 17623->17626 17626->17595 17638 7ff75a11192d 17637->17638 17639 7ff75a11193f 17637->17639 17640 7ff75a115cb4 _wfindfirst32i64 11 API calls 17638->17640 17641 7ff75a11194d 17639->17641 17646 7ff75a111989 17639->17646 17642 7ff75a111932 17640->17642 17643 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 17641->17643 17644 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17642->17644 17652 7ff75a11193d 17643->17652 17644->17652 17645 7ff75a111d05 17647 7ff75a115cb4 _wfindfirst32i64 11 API calls 17645->17647 17645->17652 17646->17645 17648 7ff75a115cb4 _wfindfirst32i64 11 API calls 17646->17648 17649 7ff75a111f99 17647->17649 17650 7ff75a111cfa 17648->17650 17653 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17649->17653 17651 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 17650->17651 17651->17645 17652->17485 17653->17652 17655 7ff75a107b76 17654->17655 17656 7ff75a107bed GetTempPathW 17655->17656 17657 7ff75a107b9a 17655->17657 17658 7ff75a107c02 17656->17658 17659 7ff75a107d70 61 API calls 17657->17659 17693 7ff75a102810 17658->17693 17660 7ff75a107ba6 17659->17660 17705 7ff75a107630 17660->17705 17671 7ff75a107cc6 17672 7ff75a107c1b __vcrt_freefls 17672->17671 17676 7ff75a107c51 17672->17676 17697 7ff75a1192c8 17672->17697 17700 7ff75a108d80 17672->17700 17694 7ff75a102835 17693->17694 17695 7ff75a115508 48 API calls 17694->17695 17696 7ff75a102854 17695->17696 17696->17672 17706 7ff75a10763c 17705->17706 17707 7ff75a108de0 57 API calls 17706->17707 17708 7ff75a10765e 17707->17708 17987 7ff75a101716 17986->17987 17988 7ff75a10172e 17986->17988 17991 7ff75a102b10 59 API calls 17987->17991 17989 7ff75a101734 17988->17989 17990 7ff75a101758 17988->17990 18118 7ff75a1012a0 17989->18118 18079 7ff75a107e20 17990->18079 17994 7ff75a101722 17991->17994 17994->16696 17997 7ff75a10174f 17997->16696 17998 7ff75a10177d 18001 7ff75a102870 59 API calls 17998->18001 17999 7ff75a1017a9 18002 7ff75a104060 116 API calls 17999->18002 18000 7ff75a102b10 59 API calls 18000->17997 18003 7ff75a101793 18001->18003 18004 7ff75a1017be 18002->18004 18003->16696 18005 7ff75a1017c6 18004->18005 18006 7ff75a1017de 18004->18006 18007 7ff75a102b10 59 API calls 18005->18007 18008 7ff75a111004 73 API calls 18006->18008 18029 7ff75a102d66 18028->18029 18030 7ff75a101ee0 49 API calls 18029->18030 18031 7ff75a102d99 18030->18031 18032 7ff75a103e80 49 API calls 18031->18032 18058 7ff75a1030ca 18031->18058 18033 7ff75a102e07 18032->18033 18034 7ff75a103e80 49 API calls 18033->18034 18035 7ff75a102e18 18034->18035 18036 7ff75a102e75 18035->18036 18037 7ff75a102e39 18035->18037 18039 7ff75a103190 75 API calls 18036->18039 18244 7ff75a103190 18037->18244 18040 7ff75a102e73 18039->18040 18041 7ff75a102ef6 18040->18041 18042 7ff75a102eb4 18040->18042 18044 7ff75a103190 75 API calls 18041->18044 18252 7ff75a1077b0 18042->18252 18046 7ff75a102f20 18044->18046 18050 7ff75a103190 75 API calls 18046->18050 18055 7ff75a102fbc 18046->18055 18052 7ff75a102f52 18050->18052 18052->18055 18053 7ff75a101ea0 59 API calls 18055->18053 18071 7ff75a1030cf 18055->18071 18080 7ff75a107e30 18079->18080 18081 7ff75a101ee0 49 API calls 18080->18081 18082 7ff75a107e71 18081->18082 18097 7ff75a107ef1 18082->18097 18161 7ff75a103ff0 18082->18161 18084 7ff75a10c010 _wfindfirst32i64 8 API calls 18085 7ff75a101775 18084->18085 18085->17998 18085->17999 18086 7ff75a107f2b 18167 7ff75a1079d0 18086->18167 18089 7ff75a107ee0 18090 7ff75a107f14 18091 7ff75a107d70 61 API calls 18095 7ff75a107ea2 __vcrt_freefls 18091->18095 18095->18089 18095->18090 18097->18084 18119 7ff75a1012b2 18118->18119 18120 7ff75a104060 116 API calls 18119->18120 18121 7ff75a1012e2 18120->18121 18122 7ff75a101301 18121->18122 18123 7ff75a1012ea 18121->18123 18125 7ff75a111004 73 API calls 18122->18125 18124 7ff75a102b10 59 API calls 18123->18124 18130 7ff75a1012fa __vcrt_freefls 18124->18130 18126 7ff75a101313 18125->18126 18127 7ff75a10133d 18126->18127 18128 7ff75a101317 18126->18128 18134 7ff75a101380 18127->18134 18135 7ff75a101358 18127->18135 18129 7ff75a102870 59 API calls 18128->18129 18131 7ff75a10132e 18129->18131 18132 7ff75a10c010 _wfindfirst32i64 8 API calls 18130->18132 18133 7ff75a11097c 74 API calls 18131->18133 18138 7ff75a101444 18132->18138 18133->18130 18137 7ff75a10139a 18134->18137 18144 7ff75a101453 18134->18144 18136 7ff75a102870 59 API calls 18135->18136 18139 7ff75a101373 18136->18139 18140 7ff75a101050 98 API calls 18137->18140 18138->17997 18138->18000 18141 7ff75a11097c 74 API calls 18139->18141 18142 7ff75a1013ab 18140->18142 18141->18130 18151 7ff75a1013b3 18142->18151 18143 7ff75a11097c 74 API calls 18147 7ff75a110ccc _fread_nolock 53 API calls 18144->18147 18150 7ff75a1014ab 18144->18150 18144->18151 18147->18144 18152 7ff75a102870 59 API calls 18150->18152 18151->18143 18162 7ff75a103ffa 18161->18162 18163 7ff75a108de0 57 API calls 18162->18163 18164 7ff75a104022 18163->18164 18165 7ff75a10c010 _wfindfirst32i64 8 API calls 18164->18165 18166 7ff75a10404a 18165->18166 18166->18086 18166->18091 18166->18095 18245 7ff75a1031c4 18244->18245 18246 7ff75a1152b4 49 API calls 18245->18246 18247 7ff75a1031ea 18246->18247 18248 7ff75a1031fb 18247->18248 18304 7ff75a1165dc 18247->18304 18250 7ff75a10c010 _wfindfirst32i64 8 API calls 18248->18250 18253 7ff75a1077be 18252->18253 18254 7ff75a104060 116 API calls 18253->18254 18305 7ff75a1165f9 18304->18305 18306 7ff75a116605 18304->18306 18321 7ff75a115ef0 18305->18321 18346 7ff75a115788 18306->18346 18563 7ff75a116918 18562->18563 18564 7ff75a11693e 18563->18564 18566 7ff75a116971 18563->18566 18565 7ff75a115cb4 _wfindfirst32i64 11 API calls 18564->18565 18567 7ff75a116943 18565->18567 18568 7ff75a116977 18566->18568 18569 7ff75a116984 18566->18569 18570 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 18567->18570 18571 7ff75a115cb4 _wfindfirst32i64 11 API calls 18568->18571 18581 7ff75a11b9e0 18569->18581 18573 7ff75a1040b9 18570->18573 18571->18573 18573->16771 18594 7ff75a1211a8 EnterCriticalSection 18581->18594 18942 7ff75a1198c4 18941->18942 18945 7ff75a1193a0 18942->18945 18946 7ff75a1193ea 18945->18946 18947 7ff75a1193bb 18945->18947 18955 7ff75a115b5c EnterCriticalSection 18946->18955 18948 7ff75a11b5cc _invalid_parameter_noinfo 37 API calls 18947->18948 18968 7ff75a104060 116 API calls 18967->18968 18969 7ff75a1015b7 18968->18969 18970 7ff75a1015e0 18969->18970 18971 7ff75a1015bf 18969->18971 18973 7ff75a111004 73 API calls 18970->18973 18972 7ff75a102b10 59 API calls 18971->18972 18974 7ff75a1015cf 18972->18974 18975 7ff75a1015f1 18973->18975 18974->16790 18976 7ff75a1015f5 18975->18976 18977 7ff75a101611 18975->18977 18978 7ff75a102870 59 API calls 18976->18978 18979 7ff75a101641 18977->18979 18980 7ff75a101621 18977->18980 18989 7ff75a10160c __vcrt_freefls 18978->18989 18981 7ff75a101656 18979->18981 18987 7ff75a10166d 18979->18987 18983 7ff75a102870 59 API calls 18980->18983 18984 7ff75a101050 98 API calls 18981->18984 18982 7ff75a11097c 74 API calls 18985 7ff75a1016e7 18982->18985 18983->18989 18984->18989 18985->16790 18986 7ff75a110ccc _fread_nolock 53 API calls 18986->18987 18987->18986 18988 7ff75a1016ae 18987->18988 18987->18989 18990 7ff75a102870 59 API calls 18988->18990 18989->18982 18990->18989 18993 7ff75a1019c3 18991->18993 18994 7ff75a10195f 18991->18994 18992 7ff75a115860 45 API calls 18992->18994 18993->16801 18994->18992 18994->18993 18996 7ff75a108de0 57 API calls 18995->18996 18997 7ff75a108487 LoadLibraryExW 18996->18997 18998 7ff75a1084a4 __vcrt_freefls 18997->18998 18998->16817 19059 7ff75a105de0 19058->19059 19060 7ff75a101ee0 49 API calls 19059->19060 19061 7ff75a105e12 19060->19061 19062 7ff75a105e3b 19061->19062 19063 7ff75a105e1b 19061->19063 19064 7ff75a105e92 19062->19064 19066 7ff75a104140 49 API calls 19062->19066 19065 7ff75a102b10 59 API calls 19063->19065 19067 7ff75a104140 49 API calls 19064->19067 19068 7ff75a105e31 19065->19068 19069 7ff75a105e5c 19066->19069 19070 7ff75a105eab 19067->19070 19072 7ff75a10c010 _wfindfirst32i64 8 API calls 19068->19072 19071 7ff75a105e7a 19069->19071 19075 7ff75a102b10 59 API calls 19069->19075 19073 7ff75a105ec9 19070->19073 19078 7ff75a102b10 59 API calls 19070->19078 19076 7ff75a103ff0 57 API calls 19071->19076 19077 7ff75a10344e 19072->19077 19074 7ff75a108470 58 API calls 19073->19074 19079 7ff75a105ed6 19074->19079 19075->19071 19080 7ff75a105e84 19076->19080 19077->16838 19086 7ff75a105f30 19077->19086 19078->19073 19081 7ff75a105efd 19079->19081 19082 7ff75a105edb 19079->19082 19080->19064 19085 7ff75a108470 58 API calls 19080->19085 19156 7ff75a1053f0 GetProcAddress 19081->19156 19083 7ff75a1029c0 57 API calls 19082->19083 19083->19068 19085->19064 19240 7ff75a104ff0 19086->19240 19088 7ff75a105f54 19157 7ff75a105412 19156->19157 19158 7ff75a105430 GetProcAddress 19156->19158 19158->19157 19242 7ff75a105015 19240->19242 19241 7ff75a10501d 19241->19088 19242->19241 19245 7ff75a1051af 19242->19245 19282 7ff75a1174f4 19242->19282 19243 7ff75a10535a __vcrt_freefls 19243->19088 19244 7ff75a104450 47 API calls 19244->19245 19245->19243 19245->19244 19283 7ff75a117524 19282->19283 19382 7ff75a115b0b 19381->19382 19390 7ff75a11ff54 19382->19390 19403 7ff75a1211a8 EnterCriticalSection 19390->19403 19405 7ff75a11bf00 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19404->19405 19406 7ff75a11b191 19405->19406 19407 7ff75a11b2bc __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19406->19407 19408 7ff75a11b1b1 19407->19408 20323 7ff75a10b1cc 20324 7ff75a10a5d3 20323->20324 20326 7ff75a10a656 20323->20326 20325 7ff75a10b850 12 API calls 20324->20325 20324->20326 20325->20326 20840 7ff75a11d2d0 20851 7ff75a1211a8 EnterCriticalSection 20840->20851 20356 7ff75a109d9b 20359 7ff75a109da1 20356->20359 20357 7ff75a10b850 12 API calls 20358 7ff75a10a656 20357->20358 20359->20357 20359->20358 19542 7ff75a121720 19543 7ff75a121744 19542->19543 19546 7ff75a121754 19542->19546 19544 7ff75a115cb4 _wfindfirst32i64 11 API calls 19543->19544 19545 7ff75a121749 19544->19545 19547 7ff75a121a34 19546->19547 19548 7ff75a121776 19546->19548 19549 7ff75a115cb4 _wfindfirst32i64 11 API calls 19547->19549 19550 7ff75a121797 19548->19550 19673 7ff75a121ddc 19548->19673 19551 7ff75a121a39 19549->19551 19554 7ff75a121809 19550->19554 19555 7ff75a1217bd 19550->19555 19571 7ff75a1217fd 19550->19571 19553 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19551->19553 19553->19545 19556 7ff75a11f948 _wfindfirst32i64 11 API calls 19554->19556 19569 7ff75a1217cc 19554->19569 19688 7ff75a11a474 19555->19688 19559 7ff75a12181f 19556->19559 19562 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19559->19562 19561 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19561->19545 19567 7ff75a12182d 19562->19567 19563 7ff75a1217c7 19568 7ff75a115cb4 _wfindfirst32i64 11 API calls 19563->19568 19564 7ff75a1217e5 19564->19571 19574 7ff75a121ddc 45 API calls 19564->19574 19565 7ff75a1218d3 19570 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19565->19570 19566 7ff75a1218b6 19566->19565 19572 7ff75a121925 19566->19572 19567->19569 19567->19571 19576 7ff75a11f948 _wfindfirst32i64 11 API calls 19567->19576 19568->19569 19569->19561 19573 7ff75a1218dc 19570->19573 19571->19566 19571->19569 19694 7ff75a1281dc 19571->19694 19572->19569 19575 7ff75a12422c 40 API calls 19572->19575 19582 7ff75a1218e1 19573->19582 19730 7ff75a12422c 19573->19730 19574->19571 19577 7ff75a121962 19575->19577 19578 7ff75a12184f 19576->19578 19579 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19577->19579 19584 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19578->19584 19585 7ff75a12196c 19579->19585 19581 7ff75a121a28 19587 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19581->19587 19582->19581 19588 7ff75a11f948 _wfindfirst32i64 11 API calls 19582->19588 19583 7ff75a12190d 19586 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19583->19586 19584->19571 19585->19569 19585->19582 19586->19582 19587->19545 19589 7ff75a1219b0 19588->19589 19590 7ff75a1219b8 19589->19590 19591 7ff75a1219c1 19589->19591 19592 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19590->19592 19593 7ff75a11b25c __std_exception_copy 37 API calls 19591->19593 19594 7ff75a1219bf 19592->19594 19595 7ff75a1219d0 19593->19595 19599 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19594->19599 19596 7ff75a1219d8 19595->19596 19597 7ff75a121a63 19595->19597 19739 7ff75a1282f4 19596->19739 19598 7ff75a11b6b8 _wfindfirst32i64 17 API calls 19597->19598 19601 7ff75a121a77 19598->19601 19599->19545 19603 7ff75a121aa0 19601->19603 19611 7ff75a121ab0 19601->19611 19606 7ff75a115cb4 _wfindfirst32i64 11 API calls 19603->19606 19604 7ff75a121a20 19607 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19604->19607 19605 7ff75a1219ff 19608 7ff75a115cb4 _wfindfirst32i64 11 API calls 19605->19608 19635 7ff75a121aa5 19606->19635 19607->19581 19609 7ff75a121a04 19608->19609 19610 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19609->19610 19610->19594 19612 7ff75a121d93 19611->19612 19613 7ff75a121ad2 19611->19613 19614 7ff75a115cb4 _wfindfirst32i64 11 API calls 19612->19614 19615 7ff75a121aef 19613->19615 19758 7ff75a121ec4 19613->19758 19616 7ff75a121d98 19614->19616 19619 7ff75a121b63 19615->19619 19621 7ff75a121b17 19615->19621 19625 7ff75a121b57 19615->19625 19618 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19616->19618 19618->19635 19623 7ff75a121b8b 19619->19623 19626 7ff75a11f948 _wfindfirst32i64 11 API calls 19619->19626 19640 7ff75a121b26 19619->19640 19620 7ff75a121c16 19634 7ff75a121c33 19620->19634 19641 7ff75a121c86 19620->19641 19773 7ff75a11a4b0 19621->19773 19623->19625 19628 7ff75a11f948 _wfindfirst32i64 11 API calls 19623->19628 19623->19640 19625->19620 19625->19640 19779 7ff75a12809c 19625->19779 19630 7ff75a121b7d 19626->19630 19633 7ff75a121bad 19628->19633 19629 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19629->19635 19636 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19630->19636 19631 7ff75a121b3f 19631->19625 19643 7ff75a121ec4 45 API calls 19631->19643 19632 7ff75a121b21 19637 7ff75a115cb4 _wfindfirst32i64 11 API calls 19632->19637 19638 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19633->19638 19639 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19634->19639 19636->19623 19637->19640 19638->19625 19642 7ff75a121c3c 19639->19642 19640->19629 19641->19640 19644 7ff75a12422c 40 API calls 19641->19644 19646 7ff75a12422c 40 API calls 19642->19646 19650 7ff75a121c42 19642->19650 19643->19625 19645 7ff75a121cc4 19644->19645 19647 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19645->19647 19648 7ff75a121c6e 19646->19648 19651 7ff75a121cce 19647->19651 19652 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19648->19652 19649 7ff75a121d87 19653 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19649->19653 19650->19649 19654 7ff75a11f948 _wfindfirst32i64 11 API calls 19650->19654 19651->19640 19651->19650 19652->19650 19653->19635 19655 7ff75a121d13 19654->19655 19656 7ff75a121d1b 19655->19656 19657 7ff75a121d24 19655->19657 19658 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19656->19658 19659 7ff75a121344 _wfindfirst32i64 37 API calls 19657->19659 19660 7ff75a121d22 19658->19660 19661 7ff75a121d32 19659->19661 19665 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19660->19665 19662 7ff75a121dc7 19661->19662 19663 7ff75a121d3a SetEnvironmentVariableW 19661->19663 19664 7ff75a11b6b8 _wfindfirst32i64 17 API calls 19662->19664 19666 7ff75a121d5e 19663->19666 19667 7ff75a121d7f 19663->19667 19668 7ff75a121ddb 19664->19668 19665->19635 19670 7ff75a115cb4 _wfindfirst32i64 11 API calls 19666->19670 19669 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19667->19669 19669->19649 19671 7ff75a121d63 19670->19671 19672 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19671->19672 19672->19660 19674 7ff75a121df9 19673->19674 19675 7ff75a121e11 19673->19675 19674->19550 19676 7ff75a11f948 _wfindfirst32i64 11 API calls 19675->19676 19683 7ff75a121e35 19676->19683 19677 7ff75a121eba 19679 7ff75a11b2bc __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19677->19679 19678 7ff75a121e96 19681 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19678->19681 19680 7ff75a121ec0 19679->19680 19681->19674 19682 7ff75a11f948 _wfindfirst32i64 11 API calls 19682->19683 19683->19677 19683->19678 19683->19682 19684 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19683->19684 19685 7ff75a11b25c __std_exception_copy 37 API calls 19683->19685 19686 7ff75a121ea5 19683->19686 19684->19683 19685->19683 19687 7ff75a11b6b8 _wfindfirst32i64 17 API calls 19686->19687 19687->19677 19689 7ff75a11a484 19688->19689 19692 7ff75a11a48d 19688->19692 19689->19692 19803 7ff75a119f4c 19689->19803 19692->19563 19692->19564 19695 7ff75a1281e9 19694->19695 19696 7ff75a12738c 19694->19696 19697 7ff75a115788 45 API calls 19695->19697 19698 7ff75a127399 19696->19698 19702 7ff75a1273cf 19696->19702 19699 7ff75a12821d 19697->19699 19700 7ff75a115cb4 _wfindfirst32i64 11 API calls 19698->19700 19714 7ff75a127340 19698->19714 19703 7ff75a128222 19699->19703 19707 7ff75a128233 19699->19707 19710 7ff75a12824a 19699->19710 19704 7ff75a1273a3 19700->19704 19701 7ff75a1273f9 19705 7ff75a115cb4 _wfindfirst32i64 11 API calls 19701->19705 19702->19701 19706 7ff75a12741e 19702->19706 19703->19571 19708 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19704->19708 19709 7ff75a1273fe 19705->19709 19715 7ff75a115788 45 API calls 19706->19715 19721 7ff75a127409 19706->19721 19711 7ff75a115cb4 _wfindfirst32i64 11 API calls 19707->19711 19712 7ff75a1273ae 19708->19712 19713 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19709->19713 19717 7ff75a128266 19710->19717 19718 7ff75a128254 19710->19718 19716 7ff75a128238 19711->19716 19712->19571 19713->19721 19714->19571 19715->19721 19722 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19716->19722 19719 7ff75a128277 19717->19719 19720 7ff75a12828e 19717->19720 19723 7ff75a115cb4 _wfindfirst32i64 11 API calls 19718->19723 20026 7ff75a1273dc 19719->20026 20035 7ff75a12a004 19720->20035 19721->19571 19722->19703 19724 7ff75a128259 19723->19724 19727 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19724->19727 19727->19703 19729 7ff75a115cb4 _wfindfirst32i64 11 API calls 19729->19703 19731 7ff75a12424e 19730->19731 19734 7ff75a12426b 19730->19734 19732 7ff75a12425c 19731->19732 19731->19734 19736 7ff75a115cb4 _wfindfirst32i64 11 API calls 19732->19736 19733 7ff75a124275 20082 7ff75a1213ac 19733->20082 19734->19733 20075 7ff75a128ce8 19734->20075 19738 7ff75a124261 __scrt_get_show_window_mode 19736->19738 19738->19583 19740 7ff75a115788 45 API calls 19739->19740 19741 7ff75a12835a 19740->19741 19742 7ff75a11fbd4 5 API calls 19741->19742 19744 7ff75a128368 19741->19744 19742->19744 19743 7ff75a115d74 14 API calls 19745 7ff75a1283c4 19743->19745 19744->19743 19746 7ff75a128454 19745->19746 19747 7ff75a115788 45 API calls 19745->19747 19749 7ff75a128465 19746->19749 19751 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19746->19751 19748 7ff75a1283d7 19747->19748 19752 7ff75a11fbd4 5 API calls 19748->19752 19754 7ff75a1283e0 19748->19754 19750 7ff75a1219fb 19749->19750 19753 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19749->19753 19750->19604 19750->19605 19751->19749 19752->19754 19753->19750 19755 7ff75a115d74 14 API calls 19754->19755 19756 7ff75a12843b 19755->19756 19756->19746 19757 7ff75a128443 SetEnvironmentVariableW 19756->19757 19757->19746 19759 7ff75a121f04 19758->19759 19766 7ff75a121ee7 19758->19766 19759->19759 19760 7ff75a11f948 _wfindfirst32i64 11 API calls 19759->19760 19768 7ff75a121f28 19760->19768 19761 7ff75a121fac 19763 7ff75a11b2bc __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19761->19763 19762 7ff75a121f89 19765 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19762->19765 19764 7ff75a121fb2 19763->19764 19765->19766 19766->19615 19767 7ff75a11f948 _wfindfirst32i64 11 API calls 19767->19768 19768->19761 19768->19762 19768->19767 19769 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19768->19769 19770 7ff75a121344 _wfindfirst32i64 37 API calls 19768->19770 19771 7ff75a121f98 19768->19771 19769->19768 19770->19768 19772 7ff75a11b6b8 _wfindfirst32i64 17 API calls 19771->19772 19772->19761 19774 7ff75a11a4c0 19773->19774 19775 7ff75a11a4c9 19773->19775 19774->19775 20094 7ff75a119fc0 19774->20094 19775->19631 19775->19632 19780 7ff75a1280a9 19779->19780 19785 7ff75a1280d6 19779->19785 19781 7ff75a1280ae 19780->19781 19780->19785 19782 7ff75a115cb4 _wfindfirst32i64 11 API calls 19781->19782 19783 7ff75a1280b3 19782->19783 19786 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19783->19786 19784 7ff75a12811a 19788 7ff75a115cb4 _wfindfirst32i64 11 API calls 19784->19788 19785->19784 19787 7ff75a128139 19785->19787 19801 7ff75a12810e __crtLCMapStringW 19785->19801 19789 7ff75a1280be 19786->19789 19790 7ff75a128155 19787->19790 19791 7ff75a128143 19787->19791 19792 7ff75a12811f 19788->19792 19789->19625 19795 7ff75a115788 45 API calls 19790->19795 19794 7ff75a115cb4 _wfindfirst32i64 11 API calls 19791->19794 19793 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19792->19793 19793->19801 19796 7ff75a128148 19794->19796 19798 7ff75a128162 19795->19798 19797 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19796->19797 19797->19801 19798->19801 20141 7ff75a129bc0 19798->20141 19801->19625 19802 7ff75a115cb4 _wfindfirst32i64 11 API calls 19802->19801 19804 7ff75a119f65 19803->19804 19817 7ff75a119f61 19803->19817 19826 7ff75a123440 19804->19826 19809 7ff75a119f77 19811 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19809->19811 19810 7ff75a119f83 19852 7ff75a11a030 19810->19852 19811->19817 19814 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19815 7ff75a119faa 19814->19815 19816 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19815->19816 19816->19817 19817->19692 19818 7ff75a11a2a0 19817->19818 19819 7ff75a11a2c9 19818->19819 19823 7ff75a11a2e2 19818->19823 19819->19692 19820 7ff75a121640 WideCharToMultiByte 19820->19823 19821 7ff75a11f948 _wfindfirst32i64 11 API calls 19821->19823 19822 7ff75a11a372 19824 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19822->19824 19823->19819 19823->19820 19823->19821 19823->19822 19825 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19823->19825 19824->19819 19825->19823 19827 7ff75a119f6a 19826->19827 19828 7ff75a12344d 19826->19828 19832 7ff75a12377c GetEnvironmentStringsW 19827->19832 19871 7ff75a11bfd4 19828->19871 19833 7ff75a119f6f 19832->19833 19834 7ff75a1237ac 19832->19834 19833->19809 19833->19810 19835 7ff75a121640 WideCharToMultiByte 19834->19835 19836 7ff75a1237fd 19835->19836 19837 7ff75a123804 FreeEnvironmentStringsW 19836->19837 19838 7ff75a11e3ac _fread_nolock 12 API calls 19836->19838 19837->19833 19839 7ff75a123817 19838->19839 19840 7ff75a123828 19839->19840 19841 7ff75a12381f 19839->19841 19843 7ff75a121640 WideCharToMultiByte 19840->19843 19842 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19841->19842 19844 7ff75a123826 19842->19844 19845 7ff75a12384b 19843->19845 19844->19837 19846 7ff75a123859 19845->19846 19847 7ff75a12384f 19845->19847 19849 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19846->19849 19848 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19847->19848 19850 7ff75a123857 FreeEnvironmentStringsW 19848->19850 19849->19850 19850->19833 19853 7ff75a11a055 19852->19853 19854 7ff75a11f948 _wfindfirst32i64 11 API calls 19853->19854 19866 7ff75a11a08b 19854->19866 19855 7ff75a11a093 19856 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19855->19856 19857 7ff75a119f8b 19856->19857 19857->19814 19858 7ff75a11a106 19859 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19858->19859 19859->19857 19860 7ff75a11f948 _wfindfirst32i64 11 API calls 19860->19866 19861 7ff75a11a0f5 20020 7ff75a11a25c 19861->20020 19862 7ff75a11b25c __std_exception_copy 37 API calls 19862->19866 19865 7ff75a11a12b 19868 7ff75a11b6b8 _wfindfirst32i64 17 API calls 19865->19868 19866->19855 19866->19858 19866->19860 19866->19861 19866->19862 19866->19865 19869 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19866->19869 19867 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19867->19855 19870 7ff75a11a13e 19868->19870 19869->19866 19872 7ff75a11c000 FlsSetValue 19871->19872 19873 7ff75a11bfe5 FlsGetValue 19871->19873 19874 7ff75a11c00d 19872->19874 19876 7ff75a11bff2 19872->19876 19875 7ff75a11bffa 19873->19875 19873->19876 19878 7ff75a11f948 _wfindfirst32i64 11 API calls 19874->19878 19875->19872 19877 7ff75a11b2bc __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19876->19877 19879 7ff75a11bff8 19876->19879 19880 7ff75a11c075 19877->19880 19881 7ff75a11c01c 19878->19881 19891 7ff75a123114 19879->19891 19882 7ff75a11c03a FlsSetValue 19881->19882 19883 7ff75a11c02a FlsSetValue 19881->19883 19885 7ff75a11c058 19882->19885 19886 7ff75a11c046 FlsSetValue 19882->19886 19884 7ff75a11c033 19883->19884 19887 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19884->19887 19888 7ff75a11bcac _wfindfirst32i64 11 API calls 19885->19888 19886->19884 19887->19876 19889 7ff75a11c060 19888->19889 19890 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19889->19890 19890->19879 19914 7ff75a123384 19891->19914 19893 7ff75a123149 19929 7ff75a122e14 19893->19929 19896 7ff75a123166 19896->19827 19897 7ff75a11e3ac _fread_nolock 12 API calls 19898 7ff75a123177 19897->19898 19899 7ff75a12317f 19898->19899 19901 7ff75a12318e 19898->19901 19900 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19899->19900 19900->19896 19901->19901 19936 7ff75a1234bc 19901->19936 19904 7ff75a12328a 19905 7ff75a115cb4 _wfindfirst32i64 11 API calls 19904->19905 19906 7ff75a12328f 19905->19906 19908 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19906->19908 19907 7ff75a1232e5 19910 7ff75a12334c 19907->19910 19947 7ff75a122c44 19907->19947 19908->19896 19909 7ff75a1232a4 19909->19907 19913 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19909->19913 19912 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19910->19912 19912->19896 19913->19907 19915 7ff75a1233a7 19914->19915 19917 7ff75a1233b1 19915->19917 19962 7ff75a1211a8 EnterCriticalSection 19915->19962 19918 7ff75a123423 19917->19918 19920 7ff75a11b2bc __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19917->19920 19918->19893 19922 7ff75a12343b 19920->19922 19924 7ff75a123492 19922->19924 19926 7ff75a11bfd4 50 API calls 19922->19926 19924->19893 19927 7ff75a12347c 19926->19927 19928 7ff75a123114 65 API calls 19927->19928 19928->19924 19930 7ff75a115788 45 API calls 19929->19930 19931 7ff75a122e28 19930->19931 19932 7ff75a122e34 GetOEMCP 19931->19932 19933 7ff75a122e46 19931->19933 19934 7ff75a122e5b 19932->19934 19933->19934 19935 7ff75a122e4b GetACP 19933->19935 19934->19896 19934->19897 19935->19934 19937 7ff75a122e14 47 API calls 19936->19937 19938 7ff75a1234e9 19937->19938 19939 7ff75a12363f 19938->19939 19940 7ff75a123526 IsValidCodePage 19938->19940 19946 7ff75a123540 __scrt_get_show_window_mode 19938->19946 19941 7ff75a10c010 _wfindfirst32i64 8 API calls 19939->19941 19940->19939 19942 7ff75a123537 19940->19942 19943 7ff75a123281 19941->19943 19944 7ff75a123566 GetCPInfo 19942->19944 19942->19946 19943->19904 19943->19909 19944->19939 19944->19946 19963 7ff75a122f2c 19946->19963 20019 7ff75a1211a8 EnterCriticalSection 19947->20019 19964 7ff75a122f69 GetCPInfo 19963->19964 19965 7ff75a12305f 19963->19965 19964->19965 19971 7ff75a122f7c 19964->19971 19966 7ff75a10c010 _wfindfirst32i64 8 API calls 19965->19966 19967 7ff75a1230fe 19966->19967 19967->19939 19968 7ff75a123c90 48 API calls 19969 7ff75a122ff3 19968->19969 19974 7ff75a128c34 19969->19974 19971->19968 19973 7ff75a128c34 54 API calls 19973->19965 19975 7ff75a115788 45 API calls 19974->19975 19976 7ff75a128c59 19975->19976 19979 7ff75a128900 19976->19979 19980 7ff75a128941 19979->19980 19981 7ff75a1203f0 _fread_nolock MultiByteToWideChar 19980->19981 19984 7ff75a12898b 19981->19984 19982 7ff75a128c09 19983 7ff75a10c010 _wfindfirst32i64 8 API calls 19982->19983 19985 7ff75a123026 19983->19985 19984->19982 19986 7ff75a11e3ac _fread_nolock 12 API calls 19984->19986 19987 7ff75a128ac1 19984->19987 19989 7ff75a1289c3 19984->19989 19985->19973 19986->19989 19987->19982 19988 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19987->19988 19988->19982 19989->19987 19990 7ff75a1203f0 _fread_nolock MultiByteToWideChar 19989->19990 19991 7ff75a128a36 19990->19991 19991->19987 20010 7ff75a11fd94 19991->20010 19994 7ff75a128a81 19994->19987 19997 7ff75a11fd94 __crtLCMapStringW 6 API calls 19994->19997 19995 7ff75a128ad2 19996 7ff75a11e3ac _fread_nolock 12 API calls 19995->19996 19998 7ff75a128ba4 19995->19998 19999 7ff75a128af0 19995->19999 19996->19999 19997->19987 19998->19987 20000 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19998->20000 19999->19987 20001 7ff75a11fd94 __crtLCMapStringW 6 API calls 19999->20001 20000->19987 20002 7ff75a128b70 20001->20002 20002->19998 20003 7ff75a128b90 20002->20003 20004 7ff75a128ba6 20002->20004 20006 7ff75a121640 WideCharToMultiByte 20003->20006 20005 7ff75a121640 WideCharToMultiByte 20004->20005 20007 7ff75a128b9e 20005->20007 20006->20007 20007->19998 20008 7ff75a128bbe 20007->20008 20008->19987 20009 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20008->20009 20009->19987 20011 7ff75a11f9c0 __crtLCMapStringW 5 API calls 20010->20011 20012 7ff75a11fdd2 20011->20012 20014 7ff75a11fdda 20012->20014 20016 7ff75a11fe80 20012->20016 20014->19987 20014->19994 20014->19995 20015 7ff75a11fe43 LCMapStringW 20015->20014 20017 7ff75a11f9c0 __crtLCMapStringW 5 API calls 20016->20017 20018 7ff75a11feae __crtLCMapStringW 20017->20018 20018->20015 20021 7ff75a11a0fd 20020->20021 20022 7ff75a11a261 20020->20022 20021->19867 20023 7ff75a11a28a 20022->20023 20024 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20022->20024 20025 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20023->20025 20024->20022 20025->20021 20027 7ff75a1273f9 20026->20027 20028 7ff75a127410 20026->20028 20029 7ff75a115cb4 _wfindfirst32i64 11 API calls 20027->20029 20028->20027 20030 7ff75a12741e 20028->20030 20031 7ff75a1273fe 20029->20031 20033 7ff75a115788 45 API calls 20030->20033 20034 7ff75a127409 20030->20034 20032 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 20031->20032 20032->20034 20033->20034 20034->19703 20036 7ff75a115788 45 API calls 20035->20036 20037 7ff75a12a029 20036->20037 20040 7ff75a129c80 20037->20040 20042 7ff75a129cce 20040->20042 20041 7ff75a10c010 _wfindfirst32i64 8 API calls 20043 7ff75a1282b5 20041->20043 20045 7ff75a129d40 GetCPInfo 20042->20045 20047 7ff75a129d55 20042->20047 20049 7ff75a129d59 20042->20049 20043->19703 20043->19729 20044 7ff75a1203f0 _fread_nolock MultiByteToWideChar 20046 7ff75a129ded 20044->20046 20045->20047 20045->20049 20048 7ff75a11e3ac _fread_nolock 12 API calls 20046->20048 20046->20049 20050 7ff75a129e24 20046->20050 20047->20044 20047->20049 20048->20050 20049->20041 20050->20049 20051 7ff75a1203f0 _fread_nolock MultiByteToWideChar 20050->20051 20052 7ff75a129e92 20051->20052 20053 7ff75a129f74 20052->20053 20054 7ff75a1203f0 _fread_nolock MultiByteToWideChar 20052->20054 20053->20049 20055 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20053->20055 20056 7ff75a129eb8 20054->20056 20055->20049 20056->20053 20057 7ff75a11e3ac _fread_nolock 12 API calls 20056->20057 20058 7ff75a129ee5 20056->20058 20057->20058 20058->20053 20059 7ff75a1203f0 _fread_nolock MultiByteToWideChar 20058->20059 20060 7ff75a129f5c 20059->20060 20061 7ff75a129f7c 20060->20061 20062 7ff75a129f62 20060->20062 20069 7ff75a11fc18 20061->20069 20062->20053 20064 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20062->20064 20064->20053 20066 7ff75a129fbb 20066->20049 20068 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20066->20068 20067 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20067->20066 20068->20049 20070 7ff75a11f9c0 __crtLCMapStringW 5 API calls 20069->20070 20071 7ff75a11fc56 20070->20071 20072 7ff75a11fc5e 20071->20072 20073 7ff75a11fe80 __crtLCMapStringW 5 API calls 20071->20073 20072->20066 20072->20067 20074 7ff75a11fcc7 CompareStringW 20073->20074 20074->20072 20076 7ff75a128d0a HeapSize 20075->20076 20077 7ff75a128cf1 20075->20077 20078 7ff75a115cb4 _wfindfirst32i64 11 API calls 20077->20078 20079 7ff75a128cf6 20078->20079 20080 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 20079->20080 20081 7ff75a128d01 20080->20081 20081->19733 20083 7ff75a1213cb 20082->20083 20084 7ff75a1213c1 20082->20084 20086 7ff75a1213d0 20083->20086 20092 7ff75a1213d7 _wfindfirst32i64 20083->20092 20085 7ff75a11e3ac _fread_nolock 12 API calls 20084->20085 20090 7ff75a1213c9 20085->20090 20087 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20086->20087 20087->20090 20088 7ff75a12140a HeapReAlloc 20088->20090 20088->20092 20089 7ff75a1213dd 20091 7ff75a115cb4 _wfindfirst32i64 11 API calls 20089->20091 20090->19738 20091->20090 20092->20088 20092->20089 20093 7ff75a1243e0 _wfindfirst32i64 2 API calls 20092->20093 20093->20092 20095 7ff75a119fd9 20094->20095 20106 7ff75a119fd5 20094->20106 20115 7ff75a12388c GetEnvironmentStringsW 20095->20115 20098 7ff75a119ff2 20122 7ff75a11a140 20098->20122 20099 7ff75a119fe6 20100 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20099->20100 20100->20106 20103 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20104 7ff75a11a019 20103->20104 20105 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20104->20105 20105->20106 20106->19775 20107 7ff75a11a380 20106->20107 20108 7ff75a11a3a3 20107->20108 20113 7ff75a11a3ba 20107->20113 20108->19775 20109 7ff75a11f948 _wfindfirst32i64 11 API calls 20109->20113 20110 7ff75a11a42e 20112 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20110->20112 20111 7ff75a1203f0 MultiByteToWideChar _fread_nolock 20111->20113 20112->20108 20113->20108 20113->20109 20113->20110 20113->20111 20114 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20113->20114 20114->20113 20116 7ff75a1238b0 20115->20116 20117 7ff75a119fde 20115->20117 20118 7ff75a11e3ac _fread_nolock 12 API calls 20116->20118 20117->20098 20117->20099 20119 7ff75a1238e7 memcpy_s 20118->20119 20120 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20119->20120 20121 7ff75a123907 FreeEnvironmentStringsW 20120->20121 20121->20117 20123 7ff75a11a168 20122->20123 20124 7ff75a11f948 _wfindfirst32i64 11 API calls 20123->20124 20136 7ff75a11a1a3 20124->20136 20125 7ff75a11a1ab 20126 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20125->20126 20127 7ff75a119ffa 20126->20127 20127->20103 20128 7ff75a11a225 20129 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20128->20129 20129->20127 20130 7ff75a11f948 _wfindfirst32i64 11 API calls 20130->20136 20131 7ff75a11a214 20133 7ff75a11a25c 11 API calls 20131->20133 20132 7ff75a121344 _wfindfirst32i64 37 API calls 20132->20136 20134 7ff75a11a21c 20133->20134 20137 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20134->20137 20135 7ff75a11a248 20138 7ff75a11b6b8 _wfindfirst32i64 17 API calls 20135->20138 20136->20125 20136->20128 20136->20130 20136->20131 20136->20132 20136->20135 20139 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20136->20139 20137->20125 20140 7ff75a11a25a 20138->20140 20139->20136 20142 7ff75a129be9 __crtLCMapStringW 20141->20142 20143 7ff75a12819e 20142->20143 20144 7ff75a11fc18 6 API calls 20142->20144 20143->19801 20143->19802 20144->20143 19484 7ff75a10b5a0 19485 7ff75a10b5ce 19484->19485 19486 7ff75a10b5b5 19484->19486 19486->19485 19488 7ff75a11e3ac 12 API calls 19486->19488 19487 7ff75a10b62c 19488->19487 20860 7ff75a12bea9 20861 7ff75a12beb8 20860->20861 20863 7ff75a12bec2 20860->20863 20864 7ff75a121208 LeaveCriticalSection 20861->20864 20146 7ff75a11bd80 20147 7ff75a11bd9a 20146->20147 20148 7ff75a11bd85 20146->20148 20152 7ff75a11bda0 20148->20152 20153 7ff75a11bdea 20152->20153 20154 7ff75a11bde2 20152->20154 20155 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20153->20155 20156 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20154->20156 20157 7ff75a11bdf7 20155->20157 20156->20153 20158 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20157->20158 20159 7ff75a11be04 20158->20159 20160 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20159->20160 20161 7ff75a11be11 20160->20161 20162 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20161->20162 20163 7ff75a11be1e 20162->20163 20164 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20163->20164 20165 7ff75a11be2b 20164->20165 20166 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20165->20166 20167 7ff75a11be38 20166->20167 20168 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20167->20168 20169 7ff75a11be45 20168->20169 20170 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20169->20170 20171 7ff75a11be55 20170->20171 20172 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20171->20172 20173 7ff75a11be65 20172->20173 20178 7ff75a11bc4c 20173->20178 20192 7ff75a1211a8 EnterCriticalSection 20178->20192 20880 7ff75a122500 20891 7ff75a128494 20880->20891 20892 7ff75a1284a1 20891->20892 20893 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20892->20893 20894 7ff75a1284bd 20892->20894 20893->20892 20895 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20894->20895 20896 7ff75a122509 20894->20896 20895->20894 20897 7ff75a1211a8 EnterCriticalSection 20896->20897 20898 7ff75a11ab00 20901 7ff75a11aa80 20898->20901 20908 7ff75a1211a8 EnterCriticalSection 20901->20908 20737 7ff75a12bc8e 20738 7ff75a12bc9e 20737->20738 20741 7ff75a115b68 LeaveCriticalSection 20738->20741 19489 7ff75a11a715 19490 7ff75a11b188 45 API calls 19489->19490 19491 7ff75a11a71a 19490->19491 19492 7ff75a11a78b 19491->19492 19493 7ff75a11a741 GetModuleHandleW 19491->19493 19501 7ff75a11a618 19492->19501 19493->19492 19499 7ff75a11a74e 19493->19499 19499->19492 19515 7ff75a11a83c GetModuleHandleExW 19499->19515 19521 7ff75a1211a8 EnterCriticalSection 19501->19521 19516 7ff75a11a899 19515->19516 19517 7ff75a11a870 GetProcAddress 19515->19517 19519 7ff75a11a89e FreeLibrary 19516->19519 19520 7ff75a11a8a5 19516->19520 19518 7ff75a11a882 19517->19518 19518->19516 19519->19520 19520->19492 20645 7ff75a12be14 20648 7ff75a115b68 LeaveCriticalSection 20645->20648 16224 7ff75a1204dc 16225 7ff75a1206ce 16224->16225 16227 7ff75a12051e _isindst 16224->16227 16277 7ff75a115cb4 16225->16277 16227->16225 16230 7ff75a12059e _isindst 16227->16230 16245 7ff75a1270e4 16230->16245 16235 7ff75a1206fa 16289 7ff75a11b6b8 IsProcessorFeaturePresent 16235->16289 16242 7ff75a1205fb 16244 7ff75a1206be 16242->16244 16270 7ff75a127128 16242->16270 16280 7ff75a10c010 16244->16280 16246 7ff75a1205bc 16245->16246 16247 7ff75a1270f3 16245->16247 16252 7ff75a1264e8 16246->16252 16293 7ff75a1211a8 EnterCriticalSection 16247->16293 16253 7ff75a1205d1 16252->16253 16254 7ff75a1264f1 16252->16254 16253->16235 16258 7ff75a126518 16253->16258 16255 7ff75a115cb4 _wfindfirst32i64 11 API calls 16254->16255 16256 7ff75a1264f6 16255->16256 16294 7ff75a11b698 16256->16294 16259 7ff75a126521 16258->16259 16263 7ff75a1205e2 16258->16263 16260 7ff75a115cb4 _wfindfirst32i64 11 API calls 16259->16260 16261 7ff75a126526 16260->16261 16262 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 16261->16262 16262->16263 16263->16235 16264 7ff75a126548 16263->16264 16265 7ff75a1205f3 16264->16265 16266 7ff75a126551 16264->16266 16265->16235 16265->16242 16267 7ff75a115cb4 _wfindfirst32i64 11 API calls 16266->16267 16268 7ff75a126556 16267->16268 16269 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 16268->16269 16269->16265 16375 7ff75a1211a8 EnterCriticalSection 16270->16375 16376 7ff75a11c078 GetLastError 16277->16376 16279 7ff75a115cbd 16279->16244 16281 7ff75a10c019 16280->16281 16282 7ff75a10c070 IsProcessorFeaturePresent 16281->16282 16283 7ff75a10c024 16281->16283 16284 7ff75a10c088 16282->16284 16393 7ff75a10c264 RtlCaptureContext 16284->16393 16290 7ff75a11b6cb 16289->16290 16398 7ff75a11b3cc 16290->16398 16296 7ff75a11b530 16294->16296 16297 7ff75a11b55b 16296->16297 16300 7ff75a11b5cc 16297->16300 16299 7ff75a11b582 16308 7ff75a11b314 16300->16308 16305 7ff75a11b607 16305->16299 16306 7ff75a11b6b8 _wfindfirst32i64 17 API calls 16307 7ff75a11b697 16306->16307 16309 7ff75a11b36b 16308->16309 16310 7ff75a11b330 GetLastError 16308->16310 16309->16305 16314 7ff75a11b380 16309->16314 16311 7ff75a11b340 16310->16311 16317 7ff75a11c140 16311->16317 16315 7ff75a11b39c GetLastError SetLastError 16314->16315 16316 7ff75a11b3b4 16314->16316 16315->16316 16316->16305 16316->16306 16318 7ff75a11c17a FlsSetValue 16317->16318 16319 7ff75a11c15f FlsGetValue 16317->16319 16320 7ff75a11c187 16318->16320 16324 7ff75a11b35b SetLastError 16318->16324 16321 7ff75a11c174 16319->16321 16319->16324 16334 7ff75a11f948 16320->16334 16321->16318 16324->16309 16325 7ff75a11c1b4 FlsSetValue 16328 7ff75a11c1c0 FlsSetValue 16325->16328 16329 7ff75a11c1d2 16325->16329 16326 7ff75a11c1a4 FlsSetValue 16327 7ff75a11c1ad 16326->16327 16341 7ff75a11b700 16327->16341 16328->16327 16347 7ff75a11bcac 16329->16347 16339 7ff75a11f959 _wfindfirst32i64 16334->16339 16335 7ff75a11f9aa 16338 7ff75a115cb4 _wfindfirst32i64 10 API calls 16335->16338 16336 7ff75a11f98e RtlAllocateHeap 16337 7ff75a11c196 16336->16337 16336->16339 16337->16325 16337->16326 16338->16337 16339->16335 16339->16336 16352 7ff75a1243e0 16339->16352 16342 7ff75a11b734 16341->16342 16343 7ff75a11b705 RtlRestoreThreadPreferredUILanguages 16341->16343 16342->16324 16343->16342 16344 7ff75a11b720 GetLastError 16343->16344 16345 7ff75a11b72d Concurrency::details::SchedulerProxy::DeleteThis 16344->16345 16346 7ff75a115cb4 _wfindfirst32i64 9 API calls 16345->16346 16346->16342 16361 7ff75a11bb84 16347->16361 16355 7ff75a124420 16352->16355 16360 7ff75a1211a8 EnterCriticalSection 16355->16360 16373 7ff75a1211a8 EnterCriticalSection 16361->16373 16377 7ff75a11c0b9 FlsSetValue 16376->16377 16382 7ff75a11c09c 16376->16382 16378 7ff75a11c0cb 16377->16378 16381 7ff75a11c0a9 16377->16381 16380 7ff75a11f948 _wfindfirst32i64 5 API calls 16378->16380 16379 7ff75a11c125 SetLastError 16379->16279 16383 7ff75a11c0da 16380->16383 16381->16379 16382->16377 16382->16381 16384 7ff75a11c0f8 FlsSetValue 16383->16384 16385 7ff75a11c0e8 FlsSetValue 16383->16385 16386 7ff75a11c104 FlsSetValue 16384->16386 16387 7ff75a11c116 16384->16387 16388 7ff75a11c0f1 16385->16388 16386->16388 16389 7ff75a11bcac _wfindfirst32i64 5 API calls 16387->16389 16390 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16388->16390 16391 7ff75a11c11e 16389->16391 16390->16381 16392 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16391->16392 16392->16379 16394 7ff75a10c27e RtlLookupFunctionEntry 16393->16394 16395 7ff75a10c09b 16394->16395 16396 7ff75a10c294 RtlVirtualUnwind 16394->16396 16397 7ff75a10c030 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16395->16397 16396->16394 16396->16395 16399 7ff75a11b406 _wfindfirst32i64 __scrt_get_show_window_mode 16398->16399 16400 7ff75a11b42e RtlCaptureContext RtlLookupFunctionEntry 16399->16400 16401 7ff75a11b468 RtlVirtualUnwind 16400->16401 16402 7ff75a11b49e IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16400->16402 16401->16402 16403 7ff75a11b4f0 _wfindfirst32i64 16402->16403 16404 7ff75a10c010 _wfindfirst32i64 8 API calls 16403->16404 16405 7ff75a11b50f GetCurrentProcess TerminateProcess 16404->16405 19409 7ff75a10b2dc 19411 7ff75a10a5da 19409->19411 19410 7ff75a10a656 19411->19410 19413 7ff75a10b850 19411->19413 19414 7ff75a10b873 19413->19414 19415 7ff75a10b88f memcpy_s 19413->19415 19416 7ff75a11e3ac 12 API calls 19414->19416 19415->19410 19416->19415 20953 7ff75a10c2e0 20954 7ff75a10c2f0 20953->20954 20970 7ff75a11a95c 20954->20970 20956 7ff75a10c2fc 20976 7ff75a10c5d8 20956->20976 20958 7ff75a10c8bc 7 API calls 20960 7ff75a10c395 20958->20960 20959 7ff75a10c314 _RTC_Initialize 20968 7ff75a10c369 20959->20968 20981 7ff75a10c788 20959->20981 20962 7ff75a10c329 20984 7ff75a119dc8 20962->20984 20968->20958 20969 7ff75a10c385 20968->20969 20971 7ff75a11a96d 20970->20971 20972 7ff75a115cb4 _wfindfirst32i64 11 API calls 20971->20972 20973 7ff75a11a975 20971->20973 20974 7ff75a11a984 20972->20974 20973->20956 20975 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 20974->20975 20975->20973 20977 7ff75a10c5e9 20976->20977 20980 7ff75a10c5ee __scrt_release_startup_lock 20976->20980 20978 7ff75a10c8bc 7 API calls 20977->20978 20977->20980 20979 7ff75a10c662 20978->20979 20980->20959 21009 7ff75a10c74c 20981->21009 20983 7ff75a10c791 20983->20962 20985 7ff75a119de8 20984->20985 20986 7ff75a10c335 20984->20986 20987 7ff75a119df0 20985->20987 20988 7ff75a119e06 GetModuleFileNameW 20985->20988 20986->20968 21008 7ff75a10c85c InitializeSListHead 20986->21008 20989 7ff75a115cb4 _wfindfirst32i64 11 API calls 20987->20989 20992 7ff75a119e31 20988->20992 20990 7ff75a119df5 20989->20990 20991 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 20990->20991 20991->20986 20993 7ff75a119d68 11 API calls 20992->20993 20994 7ff75a119e71 20993->20994 20995 7ff75a119e79 20994->20995 20999 7ff75a119e91 20994->20999 20996 7ff75a115cb4 _wfindfirst32i64 11 API calls 20995->20996 20997 7ff75a119e7e 20996->20997 20998 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20997->20998 20998->20986 21000 7ff75a119eb3 20999->21000 21002 7ff75a119ef8 20999->21002 21003 7ff75a119edf 20999->21003 21001 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 21000->21001 21001->20986 21006 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 21002->21006 21004 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 21003->21004 21005 7ff75a119ee8 21004->21005 21007 7ff75a11b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 21005->21007 21006->21000 21007->20986 21010 7ff75a10c766 21009->21010 21012 7ff75a10c75f 21009->21012 21013 7ff75a11af9c 21010->21013 21012->20983 21016 7ff75a11abd8 21013->21016 21023 7ff75a1211a8 EnterCriticalSection 21016->21023 20267 7ff75a10a76d 20268 7ff75a10a772 20267->20268 20274 7ff75a10a8da 20268->20274 20276 7ff75a10a443 20268->20276 20277 7ff75a10b960 20268->20277 20269 7ff75a10b850 12 API calls 20273 7ff75a10a656 20269->20273 20271 7ff75a10b960 12 API calls 20272 7ff75a10abe8 20271->20272 20275 7ff75a10b960 12 API calls 20272->20275 20274->20271 20274->20276 20275->20276 20276->20269 20276->20273 20278 7ff75a10b9c0 20277->20278 20279 7ff75a10befa 20278->20279 20284 7ff75a10b9df 20278->20284 20280 7ff75a10c144 8 API calls 20279->20280 20281 7ff75a10beff 20280->20281 20282 7ff75a10c010 _wfindfirst32i64 8 API calls 20283 7ff75a10bedc 20282->20283 20283->20274 20284->20282 19417 7ff75a118670 19418 7ff75a1186d7 19417->19418 19419 7ff75a11869e 19417->19419 19418->19419 19420 7ff75a1186dc FindFirstFileExW 19418->19420 19421 7ff75a115cb4 _wfindfirst32i64 11 API calls 19419->19421 19422 7ff75a1186fe GetLastError 19420->19422 19423 7ff75a118745 19420->19423 19424 7ff75a1186a3 19421->19424 19426 7ff75a118709 19422->19426 19427 7ff75a118735 19422->19427 19477 7ff75a1188e0 19423->19477 19428 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19424->19428 19426->19427 19433 7ff75a118713 19426->19433 19434 7ff75a118725 19426->19434 19431 7ff75a115cb4 _wfindfirst32i64 11 API calls 19427->19431 19430 7ff75a1186ae 19428->19430 19435 7ff75a10c010 _wfindfirst32i64 8 API calls 19430->19435 19431->19430 19432 7ff75a1188e0 _wfindfirst32i64 10 API calls 19436 7ff75a11876b 19432->19436 19433->19427 19437 7ff75a118718 19433->19437 19438 7ff75a115cb4 _wfindfirst32i64 11 API calls 19434->19438 19439 7ff75a1186c2 19435->19439 19440 7ff75a1188e0 _wfindfirst32i64 10 API calls 19436->19440 19441 7ff75a115cb4 _wfindfirst32i64 11 API calls 19437->19441 19438->19430 19442 7ff75a118779 19440->19442 19441->19430 19443 7ff75a121344 _wfindfirst32i64 37 API calls 19442->19443 19444 7ff75a118797 19443->19444 19444->19430 19445 7ff75a1187a3 19444->19445 19446 7ff75a11b6b8 _wfindfirst32i64 17 API calls 19445->19446 19447 7ff75a1187b7 19446->19447 19448 7ff75a1187e1 19447->19448 19451 7ff75a118820 FindNextFileW 19447->19451 19449 7ff75a115cb4 _wfindfirst32i64 11 API calls 19448->19449 19450 7ff75a1187e6 19449->19450 19452 7ff75a11b698 _invalid_parameter_noinfo 37 API calls 19450->19452 19453 7ff75a118870 19451->19453 19454 7ff75a11882f GetLastError 19451->19454 19458 7ff75a1187f1 19452->19458 19455 7ff75a1188e0 _wfindfirst32i64 10 API calls 19453->19455 19456 7ff75a11883a 19454->19456 19457 7ff75a118863 19454->19457 19460 7ff75a118888 19455->19460 19456->19457 19463 7ff75a118844 19456->19463 19464 7ff75a118856 19456->19464 19459 7ff75a115cb4 _wfindfirst32i64 11 API calls 19457->19459 19461 7ff75a10c010 _wfindfirst32i64 8 API calls 19458->19461 19459->19458 19462 7ff75a1188e0 _wfindfirst32i64 10 API calls 19460->19462 19466 7ff75a118804 19461->19466 19467 7ff75a118896 19462->19467 19463->19457 19468 7ff75a118849 19463->19468 19465 7ff75a115cb4 _wfindfirst32i64 11 API calls 19464->19465 19465->19458 19469 7ff75a1188e0 _wfindfirst32i64 10 API calls 19467->19469 19470 7ff75a115cb4 _wfindfirst32i64 11 API calls 19468->19470 19471 7ff75a1188a4 19469->19471 19470->19458 19472 7ff75a121344 _wfindfirst32i64 37 API calls 19471->19472 19473 7ff75a1188c2 19472->19473 19473->19458 19474 7ff75a1188ca 19473->19474 19475 7ff75a11b6b8 _wfindfirst32i64 17 API calls 19474->19475 19476 7ff75a1188de 19475->19476 19478 7ff75a1188f8 19477->19478 19479 7ff75a1188fe FileTimeToSystemTime 19477->19479 19478->19479 19481 7ff75a118923 19478->19481 19480 7ff75a11890d SystemTimeToTzSpecificLocalTime 19479->19480 19479->19481 19480->19481 19482 7ff75a10c010 _wfindfirst32i64 8 API calls 19481->19482 19483 7ff75a11875d 19482->19483 19483->19432

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 63 7ff75a101000-7ff75a1039b6 call 7ff75a110750 call 7ff75a110748 call 7ff75a1089b0 call 7ff75a110748 call 7ff75a10bfb0 call 7ff75a115ae0 call 7ff75a1166e8 call 7ff75a101ea0 81 7ff75a103b5f 63->81 82 7ff75a1039bc-7ff75a1039cc call 7ff75a103f00 63->82 84 7ff75a103b64-7ff75a103b84 call 7ff75a10c010 81->84 82->81 87 7ff75a1039d2-7ff75a1039e5 call 7ff75a103dd0 82->87 87->81 91 7ff75a1039eb-7ff75a103a12 call 7ff75a107d70 87->91 94 7ff75a103a54-7ff75a103a7c call 7ff75a108250 call 7ff75a101ca0 91->94 95 7ff75a103a14-7ff75a103a23 call 7ff75a107d70 91->95 106 7ff75a103a82-7ff75a103a98 call 7ff75a101ca0 94->106 107 7ff75a103b2d-7ff75a103b3e 94->107 95->94 101 7ff75a103a25-7ff75a103a2b 95->101 103 7ff75a103a2d-7ff75a103a35 101->103 104 7ff75a103a37-7ff75a103a51 call 7ff75a11576c call 7ff75a108250 101->104 103->104 104->94 120 7ff75a103a9a-7ff75a103ab2 call 7ff75a102b10 106->120 121 7ff75a103ab7-7ff75a103aba 106->121 110 7ff75a103b92-7ff75a103b95 107->110 111 7ff75a103b40-7ff75a103b47 107->111 115 7ff75a103bab-7ff75a103bc3 call 7ff75a108de0 110->115 116 7ff75a103b97-7ff75a103b9d 110->116 111->110 112 7ff75a103b49-7ff75a103b51 call 7ff75a108b80 111->112 130 7ff75a103b85-7ff75a103b88 call 7ff75a1014e0 112->130 131 7ff75a103b53 112->131 132 7ff75a103bc5-7ff75a103bcc 115->132 133 7ff75a103bce-7ff75a103bd5 SetDllDirectoryW 115->133 122 7ff75a103b9f-7ff75a103ba9 116->122 123 7ff75a103bdb-7ff75a103be8 call 7ff75a106ff0 116->123 120->81 121->107 124 7ff75a103abc-7ff75a103ad3 call 7ff75a104060 121->124 122->115 122->123 138 7ff75a103c33-7ff75a103c38 call 7ff75a106f70 123->138 139 7ff75a103bea-7ff75a103bf7 call 7ff75a106ca0 123->139 141 7ff75a103ad5-7ff75a103ad8 124->141 142 7ff75a103ada-7ff75a103b06 call 7ff75a1084c0 124->142 146 7ff75a103b8d-7ff75a103b90 130->146 137 7ff75a103b5a call 7ff75a102b10 131->137 132->137 133->123 137->81 149 7ff75a103c3d-7ff75a103c40 138->149 139->138 154 7ff75a103bf9-7ff75a103c08 call 7ff75a106800 139->154 147 7ff75a103b15-7ff75a103b2b call 7ff75a102b10 141->147 142->107 157 7ff75a103b08-7ff75a103b10 call 7ff75a11097c 142->157 146->81 146->110 147->81 152 7ff75a103c46-7ff75a103c50 149->152 153 7ff75a103d11-7ff75a103d20 call 7ff75a1034a0 149->153 158 7ff75a103c53-7ff75a103c5d 152->158 153->81 166 7ff75a103d26-7ff75a103d55 call 7ff75a108b50 call 7ff75a1081e0 call 7ff75a107d70 call 7ff75a103600 153->166 170 7ff75a103c0a-7ff75a103c16 call 7ff75a106780 154->170 171 7ff75a103c29-7ff75a103c2e call 7ff75a106a50 154->171 157->147 163 7ff75a103c66-7ff75a103c68 158->163 164 7ff75a103c5f-7ff75a103c64 158->164 168 7ff75a103cb1-7ff75a103cb7 163->168 169 7ff75a103c6a-7ff75a103c8d call 7ff75a101ee0 163->169 164->158 164->163 199 7ff75a103d7a-7ff75a103daa call 7ff75a108290 call 7ff75a106a50 call 7ff75a106f70 166->199 200 7ff75a103d57-7ff75a103d74 PostMessageW GetMessageW 166->200 173 7ff75a103cdc-7ff75a103d0c call 7ff75a103600 call 7ff75a103440 call 7ff75a1035f0 call 7ff75a106a50 call 7ff75a106f70 168->173 174 7ff75a103cb9-7ff75a103cd6 PostMessageW GetMessageW 168->174 169->81 182 7ff75a103c93-7ff75a103c9d 169->182 170->171 183 7ff75a103c18-7ff75a103c27 call 7ff75a106e40 170->183 171->138 173->84 174->173 186 7ff75a103ca0-7ff75a103caf 182->186 183->149 186->168 186->186 210 7ff75a103dac-7ff75a103db3 call 7ff75a107f50 199->210 211 7ff75a103db8-7ff75a103dbb call 7ff75a101e70 199->211 200->199 210->211 214 7ff75a103dc0-7ff75a103dc2 211->214 214->84
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message$EnvironmentPost$DirectoryExpandFileModuleNameStringsVariable
                                            • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                            • API String ID: 2647325126-1544818733
                                            • Opcode ID: f252fba84ed4b3c7c8924ffb43d7a4f05c6511aecea4735023743724686940cf
                                            • Instruction ID: ec75885722db14c54a79d230bd8c354070d7142c1a7dc279d781bc855bcf3f68
                                            • Opcode Fuzzy Hash: f252fba84ed4b3c7c8924ffb43d7a4f05c6511aecea4735023743724686940cf
                                            • Instruction Fuzzy Hash: DEC17221A0CA4686FE24FB22B5512BDF2B1BF44788FEC41B1EA5D47696DF3CE5058720

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 263 7ff75a126b50-7ff75a126b8b call 7ff75a1264d8 call 7ff75a1264e0 call 7ff75a126548 270 7ff75a126b91-7ff75a126b9c call 7ff75a1264e8 263->270 271 7ff75a126db5-7ff75a126e01 call 7ff75a11b6b8 call 7ff75a1264d8 call 7ff75a1264e0 call 7ff75a126548 263->271 270->271 276 7ff75a126ba2-7ff75a126bac 270->276 296 7ff75a126e07-7ff75a126e12 call 7ff75a1264e8 271->296 297 7ff75a126f3f-7ff75a126fad call 7ff75a11b6b8 call 7ff75a1223d0 271->297 278 7ff75a126bce-7ff75a126bd2 276->278 279 7ff75a126bae-7ff75a126bb1 276->279 282 7ff75a126bd5-7ff75a126bdd 278->282 281 7ff75a126bb4-7ff75a126bbf 279->281 284 7ff75a126bca-7ff75a126bcc 281->284 285 7ff75a126bc1-7ff75a126bc8 281->285 282->282 286 7ff75a126bdf-7ff75a126bf2 call 7ff75a11e3ac 282->286 284->278 288 7ff75a126bfb-7ff75a126c09 284->288 285->281 285->284 293 7ff75a126c0a-7ff75a126c16 call 7ff75a11b700 286->293 294 7ff75a126bf4-7ff75a126bf6 call 7ff75a11b700 286->294 304 7ff75a126c1d-7ff75a126c25 293->304 294->288 296->297 306 7ff75a126e18-7ff75a126e23 call 7ff75a126518 296->306 317 7ff75a126fbb-7ff75a126fbe 297->317 318 7ff75a126faf-7ff75a126fb6 297->318 304->304 307 7ff75a126c27-7ff75a126c38 call 7ff75a121344 304->307 306->297 315 7ff75a126e29-7ff75a126e4c call 7ff75a11b700 GetTimeZoneInformation 306->315 307->271 316 7ff75a126c3e-7ff75a126c94 call 7ff75a12b580 * 4 call 7ff75a126a6c 307->316 331 7ff75a126e52-7ff75a126e73 315->331 332 7ff75a126f14-7ff75a126f3e call 7ff75a1264d0 call 7ff75a1264c0 call 7ff75a1264c8 315->332 375 7ff75a126c96-7ff75a126c9a 316->375 321 7ff75a126fc0 317->321 322 7ff75a126ff5-7ff75a127008 call 7ff75a11e3ac 317->322 323 7ff75a12704b-7ff75a12704e 318->323 325 7ff75a126fc3 321->325 337 7ff75a12700a 322->337 338 7ff75a127013-7ff75a12702e call 7ff75a1223d0 322->338 324 7ff75a127054-7ff75a12705c call 7ff75a126b50 323->324 323->325 334 7ff75a126fc8-7ff75a126ff4 call 7ff75a11b700 call 7ff75a10c010 324->334 325->334 335 7ff75a126fc3 call 7ff75a126dcc 325->335 339 7ff75a126e7e-7ff75a126e85 331->339 340 7ff75a126e75-7ff75a126e7b 331->340 335->334 344 7ff75a12700c-7ff75a127011 call 7ff75a11b700 337->344 361 7ff75a127030-7ff75a127033 338->361 362 7ff75a127035-7ff75a127047 call 7ff75a11b700 338->362 346 7ff75a126e87-7ff75a126e8f 339->346 347 7ff75a126e99 339->347 340->339 344->321 346->347 354 7ff75a126e91-7ff75a126e97 346->354 357 7ff75a126e9b-7ff75a126f0f call 7ff75a12b580 * 4 call 7ff75a1239ac call 7ff75a127064 * 2 347->357 354->357 357->332 361->344 362->323 377 7ff75a126c9c 375->377 378 7ff75a126ca0-7ff75a126ca4 375->378 377->378 378->375 380 7ff75a126ca6-7ff75a126ccb call 7ff75a1175a8 378->380 386 7ff75a126cce-7ff75a126cd2 380->386 388 7ff75a126ce1-7ff75a126ce5 386->388 389 7ff75a126cd4-7ff75a126cdf 386->389 388->386 389->388 391 7ff75a126ce7-7ff75a126ceb 389->391 394 7ff75a126d6c-7ff75a126d70 391->394 395 7ff75a126ced-7ff75a126d15 call 7ff75a1175a8 391->395 396 7ff75a126d77-7ff75a126d84 394->396 397 7ff75a126d72-7ff75a126d74 394->397 402 7ff75a126d17 395->402 403 7ff75a126d33-7ff75a126d37 395->403 399 7ff75a126d9f-7ff75a126dae call 7ff75a1264d0 call 7ff75a1264c0 396->399 400 7ff75a126d86-7ff75a126d9c call 7ff75a126a6c 396->400 397->396 399->271 400->399 406 7ff75a126d1a-7ff75a126d21 402->406 403->394 408 7ff75a126d39-7ff75a126d57 call 7ff75a1175a8 403->408 406->403 410 7ff75a126d23-7ff75a126d31 406->410 415 7ff75a126d63-7ff75a126d6a 408->415 410->403 410->406 415->394 416 7ff75a126d59-7ff75a126d5d 415->416 416->394 417 7ff75a126d5f 416->417 417->415
                                            APIs
                                            • _get_daylight.LIBCMT ref: 00007FF75A126B95
                                              • Part of subcall function 00007FF75A1264E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75A1264FC
                                              • Part of subcall function 00007FF75A11B700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF75A123B72,?,?,?,00007FF75A123BAF,?,?,00000000,00007FF75A124075,?,?,00000000,00007FF75A123FA7), ref: 00007FF75A11B716
                                              • Part of subcall function 00007FF75A11B700: GetLastError.KERNEL32(?,?,?,00007FF75A123B72,?,?,?,00007FF75A123BAF,?,?,00000000,00007FF75A124075,?,?,00000000,00007FF75A123FA7), ref: 00007FF75A11B720
                                              • Part of subcall function 00007FF75A11B6B8: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF75A11B697,?,?,?,?,?,00007FF75A1138BC), ref: 00007FF75A11B6C1
                                              • Part of subcall function 00007FF75A11B6B8: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF75A11B697,?,?,?,?,?,00007FF75A1138BC), ref: 00007FF75A11B6E6
                                            • _get_daylight.LIBCMT ref: 00007FF75A126B84
                                              • Part of subcall function 00007FF75A126548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75A12655C
                                            • _get_daylight.LIBCMT ref: 00007FF75A126DFA
                                            • _get_daylight.LIBCMT ref: 00007FF75A126E0B
                                            • _get_daylight.LIBCMT ref: 00007FF75A126E1C
                                            • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF75A12705C), ref: 00007FF75A126E43
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                            • String ID: Eastern Standard Time$Eastern Summer Time
                                            • API String ID: 1458651798-239921721
                                            • Opcode ID: 56d1964116cbfe4d62757a50ddd6299317e33075484085a4832de33c5de3456c
                                            • Instruction ID: bd3eb6af0f74fb073f4a1466f6accdc816bdc21b36b8be802f8c32801a5bb1f9
                                            • Opcode Fuzzy Hash: 56d1964116cbfe4d62757a50ddd6299317e33075484085a4832de33c5de3456c
                                            • Instruction Fuzzy Hash: 3FD1CF26E08246C6FF20BF26E8505B9A371EF84794FC84175EA5D47AC5EE3EE4818760

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 448 7ff75a127a9c-7ff75a127b0f call 7ff75a1277d0 451 7ff75a127b29-7ff75a127b33 call 7ff75a118c58 448->451 452 7ff75a127b11-7ff75a127b1a call 7ff75a115c94 448->452 457 7ff75a127b4e-7ff75a127bb7 CreateFileW 451->457 458 7ff75a127b35-7ff75a127b4c call 7ff75a115c94 call 7ff75a115cb4 451->458 459 7ff75a127b1d-7ff75a127b24 call 7ff75a115cb4 452->459 461 7ff75a127bb9-7ff75a127bbf 457->461 462 7ff75a127c34-7ff75a127c3f GetFileType 457->462 458->459 470 7ff75a127e6a-7ff75a127e8a 459->470 468 7ff75a127c01-7ff75a127c2f GetLastError call 7ff75a115c28 461->468 469 7ff75a127bc1-7ff75a127bc5 461->469 465 7ff75a127c92-7ff75a127c99 462->465 466 7ff75a127c41-7ff75a127c7c GetLastError call 7ff75a115c28 CloseHandle 462->466 473 7ff75a127c9b-7ff75a127c9f 465->473 474 7ff75a127ca1-7ff75a127ca4 465->474 466->459 482 7ff75a127c82-7ff75a127c8d call 7ff75a115cb4 466->482 468->459 469->468 475 7ff75a127bc7-7ff75a127bff CreateFileW 469->475 479 7ff75a127caa-7ff75a127cff call 7ff75a118b70 473->479 474->479 480 7ff75a127ca6 474->480 475->462 475->468 487 7ff75a127d1e-7ff75a127d4f call 7ff75a127550 479->487 488 7ff75a127d01-7ff75a127d0d call 7ff75a1279d8 479->488 480->479 482->459 494 7ff75a127d51-7ff75a127d53 487->494 495 7ff75a127d55-7ff75a127d97 487->495 488->487 493 7ff75a127d0f 488->493 496 7ff75a127d11-7ff75a127d19 call 7ff75a11b878 493->496 494->496 497 7ff75a127db9-7ff75a127dc4 495->497 498 7ff75a127d99-7ff75a127d9d 495->498 496->470 501 7ff75a127e68 497->501 502 7ff75a127dca-7ff75a127dce 497->502 498->497 500 7ff75a127d9f-7ff75a127db4 498->500 500->497 501->470 502->501 504 7ff75a127dd4-7ff75a127e19 CloseHandle CreateFileW 502->504 505 7ff75a127e1b-7ff75a127e49 GetLastError call 7ff75a115c28 call 7ff75a118d98 504->505 506 7ff75a127e4e-7ff75a127e63 504->506 505->506 506->501
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                            • String ID:
                                            • API String ID: 1617910340-0
                                            • Opcode ID: 8482aad9305a30c551bfc572177b6762c68ebfb4afe3bdfce811c5be068ed5ba
                                            • Instruction ID: ce83ebf6ccf732dcb1d9500a0b9952a2f7d8106eed09d66bf2c4f87bd888e806
                                            • Opcode Fuzzy Hash: 8482aad9305a30c551bfc572177b6762c68ebfb4afe3bdfce811c5be068ed5ba
                                            • Instruction Fuzzy Hash: 97C1CE36B28A4285FF10EF6AE4902AD7771EF49BA8B480275DB2E57394DF39D051C360

                                            Control-flow Graph

                                            APIs
                                            • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF75A10153F), ref: 00007FF75A107BF7
                                              • Part of subcall function 00007FF75A107D70: GetEnvironmentVariableW.KERNEL32(00007FF75A1039FF), ref: 00007FF75A107DAA
                                              • Part of subcall function 00007FF75A107D70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF75A107DC7
                                              • Part of subcall function 00007FF75A118610: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75A118629
                                            • SetEnvironmentVariableW.KERNEL32 ref: 00007FF75A107CB1
                                              • Part of subcall function 00007FF75A102B10: MessageBoxW.USER32 ref: 00007FF75A102BE5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                            • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                            • API String ID: 3752271684-1116378104
                                            • Opcode ID: 8ca8b3c2351723dac4712d3aa85941f8869fc0faa47b2209596cb44ab2a1f07c
                                            • Instruction ID: 8a882a5f0766f8749c6936334dda00be6796f4b84935adfae14b8f22b2cd7e13
                                            • Opcode Fuzzy Hash: 8ca8b3c2351723dac4712d3aa85941f8869fc0faa47b2209596cb44ab2a1f07c
                                            • Instruction Fuzzy Hash: B7513011F0D65342FE54B722BA162BAF6A16F85BC0FDC44B1ED4E4B796ED2CE4018360
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                            • API String ID: 0-2665694366
                                            • Opcode ID: 63f3ffa9379e1e3dea1ad36e367ec88dcfea323b25a29ef61fa4fbcfb838a92b
                                            • Instruction ID: d73006d51ebd8442b47867ffaafdbf812fe15b880b133de9f2e29057727ae7e3
                                            • Opcode Fuzzy Hash: 63f3ffa9379e1e3dea1ad36e367ec88dcfea323b25a29ef61fa4fbcfb838a92b
                                            • Instruction Fuzzy Hash: C2522772A196A68BEB649F14E548B7E7BB9FF44340F994139E64A877C0DB3CD840CB10

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 957 7ff75a126dcc-7ff75a126e01 call 7ff75a1264d8 call 7ff75a1264e0 call 7ff75a126548 964 7ff75a126e07-7ff75a126e12 call 7ff75a1264e8 957->964 965 7ff75a126f3f-7ff75a126fad call 7ff75a11b6b8 call 7ff75a1223d0 957->965 964->965 970 7ff75a126e18-7ff75a126e23 call 7ff75a126518 964->970 977 7ff75a126fbb-7ff75a126fbe 965->977 978 7ff75a126faf-7ff75a126fb6 965->978 970->965 976 7ff75a126e29-7ff75a126e4c call 7ff75a11b700 GetTimeZoneInformation 970->976 989 7ff75a126e52-7ff75a126e73 976->989 990 7ff75a126f14-7ff75a126f3e call 7ff75a1264d0 call 7ff75a1264c0 call 7ff75a1264c8 976->990 980 7ff75a126fc0 977->980 981 7ff75a126ff5-7ff75a127008 call 7ff75a11e3ac 977->981 982 7ff75a12704b-7ff75a12704e 978->982 984 7ff75a126fc3 980->984 994 7ff75a12700a 981->994 995 7ff75a127013-7ff75a12702e call 7ff75a1223d0 981->995 983 7ff75a127054-7ff75a12705c call 7ff75a126b50 982->983 982->984 991 7ff75a126fc8-7ff75a126ff4 call 7ff75a11b700 call 7ff75a10c010 983->991 984->991 992 7ff75a126fc3 call 7ff75a126dcc 984->992 996 7ff75a126e7e-7ff75a126e85 989->996 997 7ff75a126e75-7ff75a126e7b 989->997 992->991 1000 7ff75a12700c-7ff75a127011 call 7ff75a11b700 994->1000 1015 7ff75a127030-7ff75a127033 995->1015 1016 7ff75a127035-7ff75a127047 call 7ff75a11b700 995->1016 1002 7ff75a126e87-7ff75a126e8f 996->1002 1003 7ff75a126e99 996->1003 997->996 1000->980 1002->1003 1009 7ff75a126e91-7ff75a126e97 1002->1009 1011 7ff75a126e9b-7ff75a126f0f call 7ff75a12b580 * 4 call 7ff75a1239ac call 7ff75a127064 * 2 1003->1011 1009->1011 1011->990 1015->1000 1016->982
                                            APIs
                                            • _get_daylight.LIBCMT ref: 00007FF75A126DFA
                                              • Part of subcall function 00007FF75A126548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75A12655C
                                            • _get_daylight.LIBCMT ref: 00007FF75A126E0B
                                              • Part of subcall function 00007FF75A1264E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75A1264FC
                                            • _get_daylight.LIBCMT ref: 00007FF75A126E1C
                                              • Part of subcall function 00007FF75A126518: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75A12652C
                                              • Part of subcall function 00007FF75A11B700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF75A123B72,?,?,?,00007FF75A123BAF,?,?,00000000,00007FF75A124075,?,?,00000000,00007FF75A123FA7), ref: 00007FF75A11B716
                                              • Part of subcall function 00007FF75A11B700: GetLastError.KERNEL32(?,?,?,00007FF75A123B72,?,?,?,00007FF75A123BAF,?,?,00000000,00007FF75A124075,?,?,00000000,00007FF75A123FA7), ref: 00007FF75A11B720
                                            • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF75A12705C), ref: 00007FF75A126E43
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _get_daylight_invalid_parameter_noinfo$ErrorInformationLanguagesLastPreferredRestoreThreadTimeZone
                                            • String ID: Eastern Standard Time$Eastern Summer Time
                                            • API String ID: 2248164782-239921721
                                            • Opcode ID: 0cf7f24dfb4a0bd8f39e31b491a0646437e2d0057ce543f8c036046d0e64ea90
                                            • Instruction ID: ca2dd55ead43a9f404b88b624aef2b72f7a123359d8c62747d354724fde0c6d4
                                            • Opcode Fuzzy Hash: 0cf7f24dfb4a0bd8f39e31b491a0646437e2d0057ce543f8c036046d0e64ea90
                                            • Instruction Fuzzy Hash: 60517E22E08642C6FB10FF26F8905A9E770FF48784F8841B5EA5D4B695EF3DE4408760
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $header crc mismatch$unknown header flags set
                                            • API String ID: 0-1127688429
                                            • Opcode ID: a8b055446104684f1ad95e328151202d31fdc591d47a14639da6131c49358b20
                                            • Instruction ID: b38541bf0cdde8e2c46c29e5cc7d3df5c93fca21c9cc36d072ee1165d403d30c
                                            • Opcode Fuzzy Hash: a8b055446104684f1ad95e328151202d31fdc591d47a14639da6131c49358b20
                                            • Instruction Fuzzy Hash: 3DF18272A193D54BFBA5AB14E088B3EBABDFF44740F6945B8DA4947390CB38E540C750
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID:
                                            • API String ID: 2295610775-0
                                            • Opcode ID: ecdf086f063d1ff4b022191a002e9e17b8509f6d6c47db3a09a7631b022981ea
                                            • Instruction ID: 49d8a47bca835463eaaae14517f2fcc581b5749f62c9635bf4f5e57c2580169d
                                            • Opcode Fuzzy Hash: ecdf086f063d1ff4b022191a002e9e17b8509f6d6c47db3a09a7631b022981ea
                                            • Instruction Fuzzy Hash: E7F08126A1C68587FBA09F64B489766B3A0BF84768F980736D66D066E4DF3CD4088B10
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: incorrect header check$invalid window size
                                            • API String ID: 0-900081337
                                            • Opcode ID: 7b159ed6ab11f424a85810e34fe73a423a8b15e185d016247a9cbb34ea0f7710
                                            • Instruction ID: 930df1e04fb2b21b2c9edea81e1d2e3c0fe87f63a0d73677c5cfec0a9e8f51df
                                            • Opcode Fuzzy Hash: 7b159ed6ab11f424a85810e34fe73a423a8b15e185d016247a9cbb34ea0f7710
                                            • Instruction Fuzzy Hash: 9E91A772A182C587FBA49F14E45CB3E7AB9FF44344F694179DA4A867D0CB38E940CB10

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 7ff75a101700-7ff75a101714 1 7ff75a101716-7ff75a10172d call 7ff75a102b10 0->1 2 7ff75a10172e-7ff75a101732 0->2 3 7ff75a101734-7ff75a10173d call 7ff75a1012a0 2->3 4 7ff75a101758-7ff75a10177b call 7ff75a107e20 2->4 11 7ff75a10174f-7ff75a101757 3->11 12 7ff75a10173f-7ff75a10174a call 7ff75a102b10 3->12 13 7ff75a10177d-7ff75a1017a8 call 7ff75a102870 4->13 14 7ff75a1017a9-7ff75a1017c4 call 7ff75a104060 4->14 12->11 20 7ff75a1017c6-7ff75a1017d9 call 7ff75a102b10 14->20 21 7ff75a1017de-7ff75a1017f1 call 7ff75a111004 14->21 26 7ff75a10191f-7ff75a101922 call 7ff75a11097c 20->26 27 7ff75a101813-7ff75a101817 21->27 28 7ff75a1017f3-7ff75a10180e call 7ff75a102870 21->28 34 7ff75a101927-7ff75a10193e 26->34 31 7ff75a101831-7ff75a101851 call 7ff75a115780 27->31 32 7ff75a101819-7ff75a101825 call 7ff75a101050 27->32 37 7ff75a101917-7ff75a10191a call 7ff75a11097c 28->37 40 7ff75a101853-7ff75a10186d call 7ff75a102870 31->40 41 7ff75a101872-7ff75a101878 31->41 38 7ff75a10182a-7ff75a10182c 32->38 37->26 38->37 49 7ff75a10190d-7ff75a101912 40->49 44 7ff75a101905-7ff75a101908 call 7ff75a11576c 41->44 45 7ff75a10187e-7ff75a101887 41->45 44->49 48 7ff75a101890-7ff75a1018b2 call 7ff75a110ccc 45->48 52 7ff75a1018e5-7ff75a1018ec 48->52 53 7ff75a1018b4-7ff75a1018cc call 7ff75a11140c 48->53 49->37 55 7ff75a1018f3-7ff75a1018fb call 7ff75a102870 52->55 59 7ff75a1018d5-7ff75a1018e3 53->59 60 7ff75a1018ce-7ff75a1018d1 53->60 61 7ff75a101900 55->61 59->55 60->48 62 7ff75a1018d3 60->62 61->44 62->61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message
                                            • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                            • API String ID: 2030045667-3833288071
                                            • Opcode ID: 624b256421d29db674d8af6d4570ff11fabce32e1a86850a83c59ddb8c2b8861
                                            • Instruction ID: 2e044d8c475a60404e4df5c7990c467cfd1617d0b49ef7ee1aa9c44c3dde6db1
                                            • Opcode Fuzzy Hash: 624b256421d29db674d8af6d4570ff11fabce32e1a86850a83c59ddb8c2b8861
                                            • Instruction Fuzzy Hash: E0518D61B0864686FE10BB16F4502BAF3B1BF44BD4FE840B1DE4D4B695EF2DE6458720

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _fread_nolock$Message
                                            • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                            • API String ID: 677216364-1384898525
                                            • Opcode ID: 5cd266322fad664289be317c9edcb8be1e00a69bd2bdfb873c0cbee326175dcc
                                            • Instruction ID: da9d59d9c5eeb5bac23cb86277de1b82a84699c78a2cd17b9fa4e60cbba4dc6d
                                            • Opcode Fuzzy Hash: 5cd266322fad664289be317c9edcb8be1e00a69bd2bdfb873c0cbee326175dcc
                                            • Instruction Fuzzy Hash: F4517A71A08A4286FF14EF25F590179B3F0FF48B84BA98576DA4C87799DE2CE440CB54

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                            • String ID: CreateProcessW$Error creating child process!
                                            • API String ID: 2895956056-3524285272
                                            • Opcode ID: b7abaf37a347f063a3628d3e0586489636cc93df3d8b7db5f5a9dd5ff1266243
                                            • Instruction ID: 9f2838c90aee188da7a1f8b97997b777dc83065664e86d1dcfd7a019736a94f7
                                            • Opcode Fuzzy Hash: b7abaf37a347f063a3628d3e0586489636cc93df3d8b7db5f5a9dd5ff1266243
                                            • Instruction Fuzzy Hash: E8414E32A08B8282EE20AB64F4452AAF3B4FF94364F940775E6AD47AD5DF7CD4448B50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 511 7ff75a101050-7ff75a1010ab call 7ff75a10b840 514 7ff75a1010d3-7ff75a1010eb call 7ff75a115780 511->514 515 7ff75a1010ad-7ff75a1010d2 call 7ff75a102b10 511->515 520 7ff75a1010ed-7ff75a101104 call 7ff75a102870 514->520 521 7ff75a101109-7ff75a101119 call 7ff75a115780 514->521 526 7ff75a101264-7ff75a101279 call 7ff75a10b520 call 7ff75a11576c * 2 520->526 527 7ff75a10111b-7ff75a101132 call 7ff75a102870 521->527 528 7ff75a101137-7ff75a101149 521->528 543 7ff75a10127e-7ff75a101298 526->543 527->526 530 7ff75a101150-7ff75a101175 call 7ff75a110ccc 528->530 537 7ff75a10125c 530->537 538 7ff75a10117b-7ff75a101185 call 7ff75a110a40 530->538 537->526 538->537 544 7ff75a10118b-7ff75a101197 538->544 545 7ff75a1011a0-7ff75a1011c8 call 7ff75a109c80 544->545 548 7ff75a101241-7ff75a101257 call 7ff75a102b10 545->548 549 7ff75a1011ca-7ff75a1011cd 545->549 548->537 550 7ff75a1011cf-7ff75a1011d9 549->550 551 7ff75a10123c 549->551 553 7ff75a101203-7ff75a101206 550->553 554 7ff75a1011db-7ff75a1011e8 call 7ff75a11140c 550->554 551->548 555 7ff75a101219-7ff75a10121e 553->555 556 7ff75a101208-7ff75a101216 call 7ff75a12aee0 553->556 560 7ff75a1011ed-7ff75a1011f0 554->560 555->545 559 7ff75a101220-7ff75a101223 555->559 556->555 562 7ff75a101225-7ff75a101228 559->562 563 7ff75a101237-7ff75a10123a 559->563 564 7ff75a1011f2-7ff75a1011fc call 7ff75a110a40 560->564 565 7ff75a1011fe-7ff75a101201 560->565 562->548 566 7ff75a10122a-7ff75a101232 562->566 563->537 564->555 564->565 565->548 566->530
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message
                                            • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                            • API String ID: 2030045667-2813020118
                                            • Opcode ID: 57368da15b5c1fc757d8ebe29877bffe9caf0f5a44bcb4222e5bb84d470f2d44
                                            • Instruction ID: 1f3304bc530efc5fe85e260f9c00b7d8ced77be35a9a7e67e3675c0863425ffc
                                            • Opcode Fuzzy Hash: 57368da15b5c1fc757d8ebe29877bffe9caf0f5a44bcb4222e5bb84d470f2d44
                                            • Instruction Fuzzy Hash: B0519F22A0968286FE20BB11B4403BAB2B5FF84794FEC41B5EE4D87795EF3CE5458750

                                            Control-flow Graph

                                            APIs
                                            • FreeLibrary.KERNEL32(?,?,?,00007FF75A11FD5A,?,?,-00000018,00007FF75A11BB0B,?,?,?,00007FF75A11BA02,?,?,?,00007FF75A11698E), ref: 00007FF75A11FB3C
                                            • GetProcAddress.KERNEL32(?,?,?,00007FF75A11FD5A,?,?,-00000018,00007FF75A11BB0B,?,?,?,00007FF75A11BA02,?,?,?,00007FF75A11698E), ref: 00007FF75A11FB48
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: AddressFreeLibraryProc
                                            • String ID: api-ms-$ext-ms-
                                            • API String ID: 3013587201-537541572
                                            • Opcode ID: 92e1c6cccb7ec25b4476ca22e51d2624e921c13e1215ab17a1d429f3080250c2
                                            • Instruction ID: 4dc8cf60db08c0cfd0725c8d396f2fc4638653b39cdce550ff57666b8f719f77
                                            • Opcode Fuzzy Hash: 92e1c6cccb7ec25b4476ca22e51d2624e921c13e1215ab17a1d429f3080250c2
                                            • Instruction Fuzzy Hash: 6E41F235B19A0281FE16EB16B9106B5A3B2BF44BD0F8D4176DD0E97784EE3DE8448364

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 844 7ff75a11c80c-7ff75a11c832 845 7ff75a11c84d-7ff75a11c851 844->845 846 7ff75a11c834-7ff75a11c848 call 7ff75a115c94 call 7ff75a115cb4 844->846 847 7ff75a11cc27-7ff75a11cc33 call 7ff75a115c94 call 7ff75a115cb4 845->847 848 7ff75a11c857-7ff75a11c85e 845->848 860 7ff75a11cc3e 846->860 867 7ff75a11cc39 call 7ff75a11b698 847->867 848->847 850 7ff75a11c864-7ff75a11c892 848->850 850->847 853 7ff75a11c898-7ff75a11c89f 850->853 856 7ff75a11c8b8-7ff75a11c8bb 853->856 857 7ff75a11c8a1-7ff75a11c8b3 call 7ff75a115c94 call 7ff75a115cb4 853->857 863 7ff75a11c8c1-7ff75a11c8c7 856->863 864 7ff75a11cc23-7ff75a11cc25 856->864 857->867 865 7ff75a11cc41-7ff75a11cc58 860->865 863->864 868 7ff75a11c8cd-7ff75a11c8d0 863->868 864->865 867->860 868->857 871 7ff75a11c8d2-7ff75a11c8f7 868->871 873 7ff75a11c92a-7ff75a11c931 871->873 874 7ff75a11c8f9-7ff75a11c8fb 871->874 875 7ff75a11c933-7ff75a11c95b call 7ff75a11e3ac call 7ff75a11b700 * 2 873->875 876 7ff75a11c906-7ff75a11c91d call 7ff75a115c94 call 7ff75a115cb4 call 7ff75a11b698 873->876 877 7ff75a11c8fd-7ff75a11c904 874->877 878 7ff75a11c922-7ff75a11c928 874->878 909 7ff75a11c978-7ff75a11c9a3 call 7ff75a11d034 875->909 910 7ff75a11c95d-7ff75a11c973 call 7ff75a115cb4 call 7ff75a115c94 875->910 906 7ff75a11cab0 876->906 877->876 877->878 880 7ff75a11c9a8-7ff75a11c9bf 878->880 883 7ff75a11ca3a-7ff75a11ca44 call 7ff75a12476c 880->883 884 7ff75a11c9c1-7ff75a11c9c9 880->884 895 7ff75a11ca4a-7ff75a11ca5f 883->895 896 7ff75a11cace 883->896 884->883 888 7ff75a11c9cb-7ff75a11c9cd 884->888 888->883 892 7ff75a11c9cf-7ff75a11c9e5 888->892 892->883 897 7ff75a11c9e7-7ff75a11c9f3 892->897 895->896 901 7ff75a11ca61-7ff75a11ca73 GetConsoleMode 895->901 899 7ff75a11cad3-7ff75a11caf3 ReadFile 896->899 897->883 902 7ff75a11c9f5-7ff75a11c9f7 897->902 904 7ff75a11caf9-7ff75a11cb01 899->904 905 7ff75a11cbed-7ff75a11cbf6 GetLastError 899->905 901->896 907 7ff75a11ca75-7ff75a11ca7d 901->907 902->883 908 7ff75a11c9f9-7ff75a11ca11 902->908 904->905 912 7ff75a11cb07 904->912 915 7ff75a11cbf8-7ff75a11cc0e call 7ff75a115cb4 call 7ff75a115c94 905->915 916 7ff75a11cc13-7ff75a11cc16 905->916 917 7ff75a11cab3-7ff75a11cabd call 7ff75a11b700 906->917 907->899 914 7ff75a11ca7f-7ff75a11caa1 ReadConsoleW 907->914 908->883 918 7ff75a11ca13-7ff75a11ca1f 908->918 909->880 910->906 922 7ff75a11cb0e-7ff75a11cb23 912->922 924 7ff75a11cac2-7ff75a11cacc 914->924 925 7ff75a11caa3 GetLastError 914->925 915->906 919 7ff75a11caa9-7ff75a11caab call 7ff75a115c28 916->919 920 7ff75a11cc1c-7ff75a11cc1e 916->920 917->865 918->883 928 7ff75a11ca21-7ff75a11ca23 918->928 919->906 920->917 922->917 931 7ff75a11cb25-7ff75a11cb30 922->931 924->922 925->919 928->883 929 7ff75a11ca25-7ff75a11ca35 928->929 929->883 936 7ff75a11cb57-7ff75a11cb5f 931->936 937 7ff75a11cb32-7ff75a11cb4b call 7ff75a11c424 931->937 940 7ff75a11cbdb-7ff75a11cbe8 call 7ff75a11c264 936->940 941 7ff75a11cb61-7ff75a11cb73 936->941 944 7ff75a11cb50-7ff75a11cb52 937->944 940->944 945 7ff75a11cbce-7ff75a11cbd6 941->945 946 7ff75a11cb75 941->946 944->917 945->917 948 7ff75a11cb7a-7ff75a11cb81 946->948 949 7ff75a11cbbd-7ff75a11cbc8 948->949 950 7ff75a11cb83-7ff75a11cb87 948->950 949->945 951 7ff75a11cb89-7ff75a11cb90 950->951 952 7ff75a11cba3 950->952 951->952 954 7ff75a11cb92-7ff75a11cb96 951->954 953 7ff75a11cba9-7ff75a11cbb9 952->953 953->948 956 7ff75a11cbbb 953->956 954->952 955 7ff75a11cb98-7ff75a11cba1 954->955 955->953 956->945
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: 2632b5e71481f962a6be5ecaceb1e66e49b379a3d4ec77b5f5b6bf13a841888b
                                            • Instruction ID: 19961ea47541ebc009def06f25cc2b8d8023ee2e2d10c5b161a97c2b886c52e4
                                            • Opcode Fuzzy Hash: 2632b5e71481f962a6be5ecaceb1e66e49b379a3d4ec77b5f5b6bf13a841888b
                                            • Instruction Fuzzy Hash: ACC1B122A0C68691FE61AB15B4402BDF7B5EF80BD0F9D41B1DA4E07791EE7CE845C3A0

                                            Control-flow Graph

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                            • String ID:
                                            • API String ID: 995526605-0
                                            • Opcode ID: 0a78fddd52e4a4b47c0abd3b9ff92470e3f80b7b026c685fad37238cb9e723cb
                                            • Instruction ID: 34dd290ae6a11064918019a8e79161a1dd6aaa9f709c63101f15578ad132bf71
                                            • Opcode Fuzzy Hash: 0a78fddd52e4a4b47c0abd3b9ff92470e3f80b7b026c685fad37238cb9e723cb
                                            • Instruction Fuzzy Hash: CF214F35A0CA4282FE10AB55F54016AF7B1FFC57A0FA80275EAAD43AE4DF6CE4548724

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00007FF75A108860: GetCurrentProcess.KERNEL32 ref: 00007FF75A108880
                                              • Part of subcall function 00007FF75A108860: OpenProcessToken.ADVAPI32 ref: 00007FF75A108891
                                              • Part of subcall function 00007FF75A108860: GetTokenInformation.KERNELBASE ref: 00007FF75A1088B6
                                              • Part of subcall function 00007FF75A108860: GetLastError.KERNEL32 ref: 00007FF75A1088C0
                                              • Part of subcall function 00007FF75A108860: GetTokenInformation.KERNELBASE ref: 00007FF75A108900
                                              • Part of subcall function 00007FF75A108860: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF75A10891C
                                              • Part of subcall function 00007FF75A108860: CloseHandle.KERNEL32 ref: 00007FF75A108934
                                            • LocalFree.KERNEL32(00000000,00007FF75A103B4E), ref: 00007FF75A108C0C
                                            • LocalFree.KERNEL32 ref: 00007FF75A108C15
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                            • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PATH_MAX!
                                            • API String ID: 6828938-1817031585
                                            • Opcode ID: b6111afcc3eeb0b408ea35522252114c0c7814765020da058c7306c730e1b11f
                                            • Instruction ID: 6773af77c00df76d75b36ff76d426720ffdeea3dc4dcec17ec235b448915b955
                                            • Opcode Fuzzy Hash: b6111afcc3eeb0b408ea35522252114c0c7814765020da058c7306c730e1b11f
                                            • Instruction Fuzzy Hash: DE218C22A0CA4682FE10BB21F5056EAB671BF88380FD805B2E94D57696DF3CE9058760

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameW.KERNEL32(?,00007FF75A1039CA), ref: 00007FF75A103F34
                                              • Part of subcall function 00007FF75A1029C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF75A108AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A1029F4
                                              • Part of subcall function 00007FF75A1029C0: MessageBoxW.USER32 ref: 00007FF75A102AD0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastMessageModuleName
                                            • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                            • API String ID: 2581892565-1977442011
                                            • Opcode ID: 7ef307d93855c796adb502a26685baad3249a75f128fd8c4618b636fbd62cd4f
                                            • Instruction ID: 6efe5969028a8a7c3972ee19e09041124a803053c4cdbe1d8519591d140a4396
                                            • Opcode Fuzzy Hash: 7ef307d93855c796adb502a26685baad3249a75f128fd8c4618b636fbd62cd4f
                                            • Instruction Fuzzy Hash: 37116325B1854382FE21B721F8513FAF274BF487C4FE80472E94E8A699EE6CE5448731
                                            APIs
                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF75A11DCFB), ref: 00007FF75A11DE2C
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF75A11DCFB), ref: 00007FF75A11DEB7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ConsoleErrorLastMode
                                            • String ID:
                                            • API String ID: 953036326-0
                                            • Opcode ID: e5bc4118b78d7803f2849d3b40dbb6165d02ed41efd1a206ffcb3739746c0941
                                            • Instruction ID: b131783489e39117a03cbef428e029fb7397b7f5d92f30894dc74c351b4881e8
                                            • Opcode Fuzzy Hash: e5bc4118b78d7803f2849d3b40dbb6165d02ed41efd1a206ffcb3739746c0941
                                            • Instruction Fuzzy Hash: 0991C572F08A5285FF50AF65A4406BDABB1AF50BC8F9841B5DE0E57684DF38D442C3B0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _get_daylight$_isindst
                                            • String ID:
                                            • API String ID: 4170891091-0
                                            • Opcode ID: a806384fd3dbc637569f566945d79e9d0f9a49a7dde5cce1babac435a7d8ed95
                                            • Instruction ID: 06ca83cbb515f68ef3987cb4b78a579d43f210a6327c05b35db0ce11672f93a5
                                            • Opcode Fuzzy Hash: a806384fd3dbc637569f566945d79e9d0f9a49a7dde5cce1babac435a7d8ed95
                                            • Instruction Fuzzy Hash: D7510272F05212CAFF14EF75A9456BCA6B1AF40398F980275ED1F52AE4DE39E8428710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                            • String ID:
                                            • API String ID: 2780335769-0
                                            • Opcode ID: bf9e299d8a19087a057b397dc8e4afdf64a098b67ef913149ee4b49067ca2483
                                            • Instruction ID: bde70c4c866aa82894dfc3ec51560325790ac76a9ab3fe6e0cc296d01b3742a2
                                            • Opcode Fuzzy Hash: bf9e299d8a19087a057b397dc8e4afdf64a098b67ef913149ee4b49067ca2483
                                            • Instruction Fuzzy Hash: 4C519F22E086418AFB10EFB1E8403BDB3B5AF84B98F588575DE1D47689DF39D54187A0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 1279662727-0
                                            • Opcode ID: 83590a85ef91dfeaaf5391bcb7c84269641a6271a066e8b030d9dbe54c1e2ad9
                                            • Instruction ID: 2036547937735f1708089b41ce64d38f08f41e6b9674902ab49d7fd43f87cb7a
                                            • Opcode Fuzzy Hash: 83590a85ef91dfeaaf5391bcb7c84269641a6271a066e8b030d9dbe54c1e2ad9
                                            • Instruction Fuzzy Hash: 1241A122D1878283FB54AB21A5003B9A270FF947A4F549374E69C07AD5DF7CE5E48790
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                            • String ID:
                                            • API String ID: 3251591375-0
                                            • Opcode ID: 938979ff9ac9d44dbfab48857d59c896d8492b2b8f443a18d798d15505071169
                                            • Instruction ID: 94e693a06e9bbc00ba2298d1805a705328ed39e03d8db27a9274f04d112597e9
                                            • Opcode Fuzzy Hash: 938979ff9ac9d44dbfab48857d59c896d8492b2b8f443a18d798d15505071169
                                            • Instruction Fuzzy Hash: 75311B21E0C25242FE64B765B4513BAB2F1BF41384FEC50B5EA4E8B2D7DE2CA4058B70
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: a9ca9fd944998b9103efb0079ab816177775b60747cbceda43ee2d2e97830e0f
                                            • Instruction ID: 92f90639b89c256d4ef944a2f74a4c7dfa2a1f6cf4fed3a8dea789876dc35a59
                                            • Opcode Fuzzy Hash: a9ca9fd944998b9103efb0079ab816177775b60747cbceda43ee2d2e97830e0f
                                            • Instruction Fuzzy Hash: E6D09E10F1871286FF143B72789507996319F58B42F9854B8C90B06393CD6DE84E83A5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryMessage
                                            • String ID: Security descriptor is not initialized!
                                            • API String ID: 73271072-986317556
                                            • Opcode ID: cb4d7abd45f9f406bb8e9fa743bd3ea339ce9ab77a45f8f760c2574a3479da4c
                                            • Instruction ID: b204d2953101e19e1eef29c7f732d2633ff3ec9718b0d11196e12a50eea8e7ab
                                            • Opcode Fuzzy Hash: cb4d7abd45f9f406bb8e9fa743bd3ea339ce9ab77a45f8f760c2574a3479da4c
                                            • Instruction Fuzzy Hash: 7BE06D71A18B46C2FE50AB24F805269B3B0BF61354FD80374E54C8A3E4DF3CD2098B00
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: cf177395047abfa4e851662a110b86e3e3c378c626585af56caf23d5c147307d
                                            • Instruction ID: ba7869cf057a15a75e168b966117217b4a55a8f8a6cf123b45fa7f8f45946f6f
                                            • Opcode Fuzzy Hash: cf177395047abfa4e851662a110b86e3e3c378c626585af56caf23d5c147307d
                                            • Instruction Fuzzy Hash: C251E561F0964186FE28BE35B54077AE2A1AF44BE8F9C4770DD6D077C9CE3CE44186A0
                                            APIs
                                            • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF75A11B78D,?,?,00000000,00007FF75A11B842), ref: 00007FF75A11B97E
                                            • GetLastError.KERNEL32(?,?,?,00007FF75A11B78D,?,?,00000000,00007FF75A11B842), ref: 00007FF75A11B988
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ChangeCloseErrorFindLastNotification
                                            • String ID:
                                            • API String ID: 1687624791-0
                                            • Opcode ID: 3fd0f83af0628cda6e58ba1b17cfc613668cd8d43ebee099ac9aff2e4f27651a
                                            • Instruction ID: 26403dce43bf9e267e4072e4625599e491bc11b78f830670891018e0f5b3b3ba
                                            • Opcode Fuzzy Hash: 3fd0f83af0628cda6e58ba1b17cfc613668cd8d43ebee099ac9aff2e4f27651a
                                            • Instruction Fuzzy Hash: 4F21F661F0C64641FE907725B59027896A35F84BA4F8C43F5DA2E473D2EE2CE44683A0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastPointer
                                            • String ID:
                                            • API String ID: 2976181284-0
                                            • Opcode ID: 5a688e03e61d2ba522e05303caa220c229835d3c67e189c94220df843fa187e3
                                            • Instruction ID: 5f5e4a6a733d1227fd59b04c7710730dbfe35efc66768127f8c1b4ef84ef42f0
                                            • Opcode Fuzzy Hash: 5a688e03e61d2ba522e05303caa220c229835d3c67e189c94220df843fa187e3
                                            • Instruction Fuzzy Hash: 1F11B265708A8281EE20AB29B404169F371AF45BF4F984371EA7D0B7D9CF3CD0548780
                                            APIs
                                            • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF75A116101), ref: 00007FF75A11621F
                                            • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF75A116101), ref: 00007FF75A116235
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Time$System$FileLocalSpecific
                                            • String ID:
                                            • API String ID: 1707611234-0
                                            • Opcode ID: 94d9743ddc59f1ec6d0c8066f19f46560215df41a9b86dc953b2c7251607b198
                                            • Instruction ID: 75c684d84f6b0cb3b3d0d1d126741eb4297cd5a2bd8a740d873e2427071583c4
                                            • Opcode Fuzzy Hash: 94d9743ddc59f1ec6d0c8066f19f46560215df41a9b86dc953b2c7251607b198
                                            • Instruction Fuzzy Hash: 18119172A0C64282FF54AB55F40113AF7B4FF84761F940275EAAE819E8EF2DD044CB60
                                            APIs
                                            • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF75A11875D), ref: 00007FF75A118903
                                            • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF75A11875D), ref: 00007FF75A118919
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Time$System$FileLocalSpecific
                                            • String ID:
                                            • API String ID: 1707611234-0
                                            • Opcode ID: 4ed2e9fa1167940cfa5aca87292fc65ce3ac60374052c1fe1dcdfc496945e827
                                            • Instruction ID: 5a167b0b0a03ff8bb279bdc0855d18d80f40c07dd5e4849b9bc561317efacb0e
                                            • Opcode Fuzzy Hash: 4ed2e9fa1167940cfa5aca87292fc65ce3ac60374052c1fe1dcdfc496945e827
                                            • Instruction Fuzzy Hash: 4601823250C256C2FB606B15B40123AF7B2FF81761FA44276E7A9015D8EF3DD000DB20
                                            APIs
                                            • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF75A123B72,?,?,?,00007FF75A123BAF,?,?,00000000,00007FF75A124075,?,?,00000000,00007FF75A123FA7), ref: 00007FF75A11B716
                                            • GetLastError.KERNEL32(?,?,?,00007FF75A123B72,?,?,?,00007FF75A123BAF,?,?,00000000,00007FF75A124075,?,?,00000000,00007FF75A123FA7), ref: 00007FF75A11B720
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ErrorLanguagesLastPreferredRestoreThread
                                            • String ID:
                                            • API String ID: 588628887-0
                                            • Opcode ID: c0904582055235206b637bb6fb630becad907d152bf6a94a3ba36ee294329771
                                            • Instruction ID: c9a17ef89d7d1d24db96ebc9eb8478611826938293cc16293f96209898ccaecc
                                            • Opcode Fuzzy Hash: c0904582055235206b637bb6fb630becad907d152bf6a94a3ba36ee294329771
                                            • Instruction Fuzzy Hash: DBE0CD14F0D20283FF147BF274D557592B14F84750FCC04B0DA0D4A3A1DE3CA88582B4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: DirectoryErrorLastRemove
                                            • String ID:
                                            • API String ID: 377330604-0
                                            • Opcode ID: 37b4a7e4d00d01a0eafeac234b577e395ecf372998b901b949fd5718f631df3e
                                            • Instruction ID: 95b8201d3bcce5d3045bd5553701c61d8f55a0bf0d1e4d38e324b209646bc348
                                            • Opcode Fuzzy Hash: 37b4a7e4d00d01a0eafeac234b577e395ecf372998b901b949fd5718f631df3e
                                            • Instruction Fuzzy Hash: 72D0A904E08102C1FE1037B6284003894B02F40774FE806B0C11D801D0DE2CA04685A2
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: DeleteErrorFileLast
                                            • String ID:
                                            • API String ID: 2018770650-0
                                            • Opcode ID: b1319888d58344e1d146038dbe51c945b0a95c66f9246088a0a26429922302e0
                                            • Instruction ID: 9da458623ee49cbd2d82fa1892235bebcc2d95e54937f39c797ebadccd22093c
                                            • Opcode Fuzzy Hash: b1319888d58344e1d146038dbe51c945b0a95c66f9246088a0a26429922302e0
                                            • Instruction Fuzzy Hash: 8AD0C918E2950382FE1437B6288557995B82F44760FE807F0D12D811D0DE1CA09501A5
                                            APIs
                                              • Part of subcall function 00007FF75A108DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF75A102A9B), ref: 00007FF75A108E1A
                                            • _findclose.LIBCMT ref: 00007FF75A1081A9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide_findclose
                                            • String ID:
                                            • API String ID: 2772937645-0
                                            • Opcode ID: aa2a36deec39c3a11ec2b62d31fe43dc86d3decf01d493f1b5c8a3539a39b282
                                            • Instruction ID: a0f12c88b8164171e8b6c49ac95a648ae00eb969757a9386e41b63f312ef5d25
                                            • Opcode Fuzzy Hash: aa2a36deec39c3a11ec2b62d31fe43dc86d3decf01d493f1b5c8a3539a39b282
                                            • Instruction Fuzzy Hash: 5E716152E18AC581EA11DB2CD5052FDB370FBA9B48F98E331DB9C12596EF28E2D5C710
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: 23588c1d4a76148e9b0b46970dab15bc80394bd809d2a1daf00a983cf625f788
                                            • Instruction ID: 6f5979850b8e6305f1f60ad3842ee44f627c55deb7f1fd95d5b5f53fdf9f7269
                                            • Opcode Fuzzy Hash: 23588c1d4a76148e9b0b46970dab15bc80394bd809d2a1daf00a983cf625f788
                                            • Instruction Fuzzy Hash: E141C53290964187FE24AB29F54027EB7B0EF56790F9801B1D68D83690CF2DE403C7E1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _fread_nolock
                                            • String ID:
                                            • API String ID: 840049012-0
                                            • Opcode ID: abb0a441ba213b71513b42266341038178bc818bc484ec2583296a54737cf4fb
                                            • Instruction ID: e9a77bc96eac20fa7aac7fe4f2594fd56c88efaa21608c8f2deb2f130a95f380
                                            • Opcode Fuzzy Hash: abb0a441ba213b71513b42266341038178bc818bc484ec2583296a54737cf4fb
                                            • Instruction Fuzzy Hash: 09216D21B0D69686FE50BE12B9047FAFAA1BF45BD4FDC4470EE0D46786DE3CE0418614
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: 9d46e4dc1c7706e1baa247f93764384ede75e9bcf433252d370e5f4900f7c3d5
                                            • Instruction ID: 0b17efb34f098afe35eec14cda30471aa666926f1c5c22fafd64da37a0bc85d9
                                            • Opcode Fuzzy Hash: 9d46e4dc1c7706e1baa247f93764384ede75e9bcf433252d370e5f4900f7c3d5
                                            • Instruction Fuzzy Hash: AF31AE22E1865285FF11BF15A881378E6B0AF40BE1F8902B5DA5D073D2DFBCA44287B1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: HandleModule$AddressFreeLibraryProc
                                            • String ID:
                                            • API String ID: 3947729631-0
                                            • Opcode ID: 9c0127de50016242ddc74074b6af7f5d0c7ecdfc40d630aae62ff1a96a90ed2f
                                            • Instruction ID: 249153f79fa7a78f222170309f033ed2655a47cadbc28a4a95aa0e998224447f
                                            • Opcode Fuzzy Hash: 9c0127de50016242ddc74074b6af7f5d0c7ecdfc40d630aae62ff1a96a90ed2f
                                            • Instruction Fuzzy Hash: F0216B36A04B0589FF24AF64E4806FC7BB0EF44718F88067AD65D06AD5DF39D585C7A0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: a12511eb413a20500788068782fa49ddb1fe92b02a1e7189881bce5d81ea64e9
                                            • Instruction ID: 0adafb8713a0e3926ffee04c9123f2335a9740f3e95b0f39caa2380eafb22bd7
                                            • Opcode Fuzzy Hash: a12511eb413a20500788068782fa49ddb1fe92b02a1e7189881bce5d81ea64e9
                                            • Instruction Fuzzy Hash: 3111C321A0D28586FE60BF11F500279E2B5AF84B80FCC0071EA8C07B86EF3DE40087A0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: 14b88cdde8f100e0c11df9c25968cfa6048feb9caeb9ba24198eb79990a08c61
                                            • Instruction ID: 40e2d0ac497bbe461b145c660a8e48b8d876a0da6332b502ae196ac419459911
                                            • Opcode Fuzzy Hash: 14b88cdde8f100e0c11df9c25968cfa6048feb9caeb9ba24198eb79990a08c61
                                            • Instruction Fuzzy Hash: B8218332A18A8186EF61AF19F45037AB7B1EF84BA4F984234E65D476D5EF3DD4018B10
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: cb4a28c9cfe68d4bf5caf65282be0dfe2d74942f75b7edef78e8fd4dc80d0569
                                            • Instruction ID: db68b17f1f3e80877c4b841feb2e0165bd3a0c6e31bb81c75f728ae21fad6def
                                            • Opcode Fuzzy Hash: cb4a28c9cfe68d4bf5caf65282be0dfe2d74942f75b7edef78e8fd4dc80d0569
                                            • Instruction Fuzzy Hash: 0D015E61E0874141FE04AB62A9001A9E6B5AF95FE0F8C46B1EE6C5BBDADE3CE5018350
                                            APIs
                                            • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF75A11C196,?,?,?,00007FF75A11B35B,?,?,00000000,00007FF75A11B5F6), ref: 00007FF75A11F99D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: 83da86fcac40c5efe6be46efa8cccb7ed61db28345aee0e9c2556edc7e0339ef
                                            • Instruction ID: a6f2697eea1bab539364d18201cdc887384877d5c97adc3a9ecc855b3c86318f
                                            • Opcode Fuzzy Hash: 83da86fcac40c5efe6be46efa8cccb7ed61db28345aee0e9c2556edc7e0339ef
                                            • Instruction Fuzzy Hash: 24F0C200B0930A91FE14776274503B5C2B24F88B80FCC40B1DD0F463C5FE1CE4808271
                                            APIs
                                            • RtlAllocateHeap.NTDLL(?,?,?,00007FF75A111514,?,?,?,00007FF75A112A26,?,?,?,?,?,00007FF75A114019), ref: 00007FF75A11E3EA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: d8b55510c5610d80ab4c44b86d687719a9e038cf882b555fd49ed5282eff217e
                                            • Instruction ID: e61b7a10a8a88fd6e10c6fd4435542a22e43e31766ebcf6773f97e38998a6775
                                            • Opcode Fuzzy Hash: d8b55510c5610d80ab4c44b86d687719a9e038cf882b555fd49ed5282eff217e
                                            • Instruction Fuzzy Hash: F9F05E10F2D28285FE2576A27850679D2B04F447A0FCC06B0DD2E866C1DE2CE48182BA
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: CriticalDeleteSection
                                            • String ID:
                                            • API String ID: 166494926-0
                                            • Opcode ID: 70cb572a17e4ae51ee1f214201d3cf8466319a562858284c45fcaed274c90f17
                                            • Instruction ID: cbba573be03c590b8d9d8a6a52c32806ed4c61848d2661cbd2567ef06f73030d
                                            • Opcode Fuzzy Hash: 70cb572a17e4ae51ee1f214201d3cf8466319a562858284c45fcaed274c90f17
                                            • Instruction Fuzzy Hash: D0F03055E8890A81FF00BBAAF89137493F0EFD8755FC800B2C94E062629D5CA0848271
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: DirectoryErrorLastRemove
                                            • String ID:
                                            • API String ID: 377330604-0
                                            • Opcode ID: e140006c7abab774a19e08411b5018998d542d9efd9fe9fe0f362e7ec3b7c894
                                            • Instruction ID: 803dc91678461e8f63667ae6f8fa894c2556b6fd6854dca2aa57c30754d75b90
                                            • Opcode Fuzzy Hash: e140006c7abab774a19e08411b5018998d542d9efd9fe9fe0f362e7ec3b7c894
                                            • Instruction Fuzzy Hash: 45419A16D1CAC542FB11AB24A5012FDB770FF95784F999272DB8D42297EF28A5D8C320
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: AddressProc
                                            • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                            • API String ID: 190572456-4266016200
                                            • Opcode ID: 849092ee313d90182648ac5091f6841dd271f5938a0293141bcf3cafd9cdb4f6
                                            • Instruction ID: c52efdb00596baf695e5516e65e3b7ab6f76e167c591ffd8047a03ecb02dff42
                                            • Opcode Fuzzy Hash: 849092ee313d90182648ac5091f6841dd271f5938a0293141bcf3cafd9cdb4f6
                                            • Instruction Fuzzy Hash: CF129064A4AB03D1FE55AB06F894174B3B1BF447A5BEC90B5D80E062A4FF7EE5488331
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                            • API String ID: 808467561-2761157908
                                            • Opcode ID: c804c22466df2b92b362f5d1d066b057dea08e8c29dc99d8cb90910c2247e431
                                            • Instruction ID: d29e3ae7dc5879983afdba2e78372958fca9da0bc18cb2242c0ce810b37d007e
                                            • Opcode Fuzzy Hash: c804c22466df2b92b362f5d1d066b057dea08e8c29dc99d8cb90910c2247e431
                                            • Instruction Fuzzy Hash: 67B2D572E18282CBFB249E66E5807FDB7B2FF44394F885175DA0957A84DB3DE9008B50
                                            APIs
                                            • GetLastError.KERNEL32(00000000,00007FF75A102A3E,?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A108797
                                            • FormatMessageW.KERNEL32 ref: 00007FF75A1087C6
                                            • WideCharToMultiByte.KERNEL32 ref: 00007FF75A10881C
                                              • Part of subcall function 00007FF75A1029C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF75A108AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A1029F4
                                              • Part of subcall function 00007FF75A1029C0: MessageBoxW.USER32 ref: 00007FF75A102AD0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                            • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                            • API String ID: 2920928814-2573406579
                                            • Opcode ID: 71548051bea7547f5d5b972cb2661fdb12455c7e02de19cea235076eba1ea75f
                                            • Instruction ID: b2e0f4b6ab87501c30c18888f4135d7ccac2c2ffdb2535431347fcd36e598088
                                            • Opcode Fuzzy Hash: 71548051bea7547f5d5b972cb2661fdb12455c7e02de19cea235076eba1ea75f
                                            • Instruction Fuzzy Hash: 36216031A0CA46C2FF60AB15F8442BAB675BF88744FD80175D68D866A8EF3CE5458720
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                            • String ID:
                                            • API String ID: 3140674995-0
                                            • Opcode ID: 4f1605a870b3ab58307638b90f69401c730c876d9dfa7ce500e329c816792819
                                            • Instruction ID: 9004442e32a62a54efd60926787bec7722a49e306ca61dbe7c0dcaf9b3f482e5
                                            • Opcode Fuzzy Hash: 4f1605a870b3ab58307638b90f69401c730c876d9dfa7ce500e329c816792819
                                            • Instruction Fuzzy Hash: D0310C72609A81C6FB60AF61E8403A9B3B5FF84744F48403ADA4D57B95DF39D648CB24
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                            • String ID:
                                            • API String ID: 1239891234-0
                                            • Opcode ID: f3d77d60e417bce1f0fe908812719be64cab24703666754eed0168e01bd0a785
                                            • Instruction ID: 678b81de19107b9b10af175471a2d3cf45759201dc7435742cd1b6a44f09b738
                                            • Opcode Fuzzy Hash: f3d77d60e417bce1f0fe908812719be64cab24703666754eed0168e01bd0a785
                                            • Instruction Fuzzy Hash: B3315E36608B8186EB60DF25E8402AEB3B4FF88758F980176EA8D43B55EF38C545CB50
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: FileFindFirst_invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 2227656907-0
                                            • Opcode ID: 62c56db1a939844cd1187580cc39da8c2b13d784ec33e52841a564721c35b8dc
                                            • Instruction ID: 3b11f20d814e19c069dc77faf1a7365121f02c2841b70da66258149bd430d151
                                            • Opcode Fuzzy Hash: 62c56db1a939844cd1187580cc39da8c2b13d784ec33e52841a564721c35b8dc
                                            • Instruction Fuzzy Hash: 3FB1B626B1869681FE61AB26B5001BDE3B1EF54BE4F8C5171EA9D0BBC5DE3DE441C310
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                            • String ID:
                                            • API String ID: 2933794660-0
                                            • Opcode ID: 9121cd0992376079c28b7b15cfb2bb882a77f2b3c78bb4ce64e2c22522254d02
                                            • Instruction ID: 3356a9dcdba81c9f42cfea9d7988c386b37a6d735a8da9d96f27cd3dcfbf6059
                                            • Opcode Fuzzy Hash: 9121cd0992376079c28b7b15cfb2bb882a77f2b3c78bb4ce64e2c22522254d02
                                            • Instruction Fuzzy Hash: ED114826B14B058AFF00AF61F8442A873B4FF58758F880E31DA2D867A4DF78D5548390
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: memcpy_s
                                            • String ID:
                                            • API String ID: 1502251526-0
                                            • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                            • Instruction ID: 5efd7a936edd0d5b3394029fb73d6396d7bb2e66562e27887d74201cfd10c366
                                            • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                            • Instruction Fuzzy Hash: 10C1D472B18685C7FB24DF1AB04466AB7A1FF94784F898135DB4A43744DB3EE801CB40
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ExceptionRaise_clrfp
                                            • String ID:
                                            • API String ID: 15204871-0
                                            • Opcode ID: 107d115b060fbd35a116a220a90c3f58689526778be32960ff8b0eb29206904d
                                            • Instruction ID: 29131ffae83376f22204fca49f69388514e285a8eb3212984ab09218402abf2e
                                            • Opcode Fuzzy Hash: 107d115b060fbd35a116a220a90c3f58689526778be32960ff8b0eb29206904d
                                            • Instruction Fuzzy Hash: 3BB14A73A04B85CAEB15CF2AE846368BBB0FF44B48F598971DA5D837A4CB3AD451C710
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $
                                            • API String ID: 0-227171996
                                            • Opcode ID: a4155c6fffaecf52a824239c2b6f37dbc1b24f1087258a4a4fa2a9ab421e67c4
                                            • Instruction ID: 5e06d41ca5af27faa77d2b8ce1faf0781e43aa63df73eb4344d13de25940121f
                                            • Opcode Fuzzy Hash: a4155c6fffaecf52a824239c2b6f37dbc1b24f1087258a4a4fa2a9ab421e67c4
                                            • Instruction Fuzzy Hash: E6E1C2B6A1865282FF68EE29A05013DB3B0FF45F48F9C4275CB4E07694DF29E851C7A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: e+000$gfff
                                            • API String ID: 0-3030954782
                                            • Opcode ID: b0eb00ec9cc72bcbd25ebaa9050c7cd18c6ed420f4824bc0d073d86035fcaeec
                                            • Instruction ID: 861586ad15ef14fbd6dd60dd3ae9be27f03148eede71d36181fc32382b32707b
                                            • Opcode Fuzzy Hash: b0eb00ec9cc72bcbd25ebaa9050c7cd18c6ed420f4824bc0d073d86035fcaeec
                                            • Instruction Fuzzy Hash: FC517822B182C186FF209E75B900779EBA1EB84B94F8C9671CB9C47AC5CF3DE4048750
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: CurrentFeaturePresentProcessProcessor
                                            • String ID:
                                            • API String ID: 1010374628-0
                                            • Opcode ID: 66766e13358cd5f4de93a3d461a286b1618a0db40b5e27b20b34ea7eab166179
                                            • Instruction ID: 9f195536f6ae6fcc3cdd22a23b1dd5e67ebe52d812d3076e3b9ed96e53a40aef
                                            • Opcode Fuzzy Hash: 66766e13358cd5f4de93a3d461a286b1618a0db40b5e27b20b34ea7eab166179
                                            • Instruction Fuzzy Hash: 91028825E0D64A80FE55FB22B50027DE6F5AF41BA0FCC46B5DD6D462D2EE3EE4018360
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: gfffffff
                                            • API String ID: 0-1523873471
                                            • Opcode ID: ce984bed762576d5ac079d260fe98dbb5d2c0c9497d8241e3c95b971abe0b5e7
                                            • Instruction ID: af13ba85dee7d22f6118a8b308e9f342a9e721a8d9941ea2f9965c908512aafb
                                            • Opcode Fuzzy Hash: ce984bed762576d5ac079d260fe98dbb5d2c0c9497d8241e3c95b971abe0b5e7
                                            • Instruction Fuzzy Hash: 7DA15522A0878A86FF21DB65B0407B9BBA1AF50B84F488072DE8E477C1EE3DD501C795
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: TMP
                                            • API String ID: 3215553584-3125297090
                                            • Opcode ID: 8ec06a2b4782e0689436fe5663854b321090610fcf5247d2cfa23e18c307cdc4
                                            • Instruction ID: 5a40bb6e5be48ca83a0095cc72be67d73dfa6fcf37e3d2fbb2b3bf0b1a5931fe
                                            • Opcode Fuzzy Hash: 8ec06a2b4782e0689436fe5663854b321090610fcf5247d2cfa23e18c307cdc4
                                            • Instruction Fuzzy Hash: 9D51C119F0874741FE64BB267A0117AD6B66F84B94FCC80B5DE1E4B7C5EE3CE44282A4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: HeapProcess
                                            • String ID:
                                            • API String ID: 54951025-0
                                            • Opcode ID: ed995d9d252c3e0c61107ed1ba5c48f1392176915e7fcf845d28b2722b2e2d45
                                            • Instruction ID: 613fbd4094f3fbd50d5bbcf705a1ee74eda56d1c539e9704d846e95209bdecb0
                                            • Opcode Fuzzy Hash: ed995d9d252c3e0c61107ed1ba5c48f1392176915e7fcf845d28b2722b2e2d45
                                            • Instruction Fuzzy Hash: D9B09220E07A02C6FE083B2A7C8221462B87F48710FD840B8C10D45320EE2C24E58721
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ca9df69fd1c27fd416770dca946a20fccf44885df857cf64186a4c680355c85b
                                            • Instruction ID: 5294616239eb2abddc87c3463ed44ea3759c9bed6c923af1b8cba225b330c95e
                                            • Opcode Fuzzy Hash: ca9df69fd1c27fd416770dca946a20fccf44885df857cf64186a4c680355c85b
                                            • Instruction Fuzzy Hash: BAD1C3AAA0864286FF68EA25A54027DA7B0EF45F58F9C4275CF0D07695DF3DE841C3E0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6d76246942c46f132312ebc4a4bc27c309f6729675ee6fb805fd22939f347a0
                                            • Instruction ID: 4d40a2764a5e1dafca055b88e4257dcfadedddcdebcf3a045b7c3aaf712319b5
                                            • Opcode Fuzzy Hash: a6d76246942c46f132312ebc4a4bc27c309f6729675ee6fb805fd22939f347a0
                                            • Instruction Fuzzy Hash: 5DC1A6721141E14BD6C9EB29E46957A77E1FB8934DBD4403AEB8B47B8AC63CA014DB10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fa501f5897fa8170c1c3089a9165536d111e8d2735d862654f88cabfcab8bd87
                                            • Instruction ID: c36a2b942b2a78c9b8d70814e8d4da7dee5b384ab75cfffb75f11177796304df
                                            • Opcode Fuzzy Hash: fa501f5897fa8170c1c3089a9165536d111e8d2735d862654f88cabfcab8bd87
                                            • Instruction Fuzzy Hash: 29B1A176E0875585FBA4AF29E05413CBBB0EB45F48FA84275CA4D47399CF39D841C7A0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dde3b387bb0edac5d3a7572aaf71fcdce3ba0ac9d1c4353072e234eccf42a557
                                            • Instruction ID: 21da3020fe8f7fd970dc97c20fae79394b40346dc6f4c7f00371081543d1e152
                                            • Opcode Fuzzy Hash: dde3b387bb0edac5d3a7572aaf71fcdce3ba0ac9d1c4353072e234eccf42a557
                                            • Instruction Fuzzy Hash: 4981F472A0C78146FBB4DF19B14037AEAA1FF85794F988276DA8D43B99CE3CD4008B50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID:
                                            • API String ID: 3215553584-0
                                            • Opcode ID: 0545a2559c330c3b8b837ff60ad1fca552f4247d75f95da319e64bf11632f5cd
                                            • Instruction ID: 1eb2af711db3db762604a0b87ff36296debb4c3ac62634f6fd8d0d026d44703c
                                            • Opcode Fuzzy Hash: 0545a2559c330c3b8b837ff60ad1fca552f4247d75f95da319e64bf11632f5cd
                                            • Instruction Fuzzy Hash: 6C610E21E1C182C7FF64B92EB45427BE6A1AF50360F9D06B9D65D476D1EE6ED8008720
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 431273df7c005eff8b086499786a7f8af66af839407972891033f6f8b32510fa
                                            • Instruction ID: bf216baa2d0a82810b619fa45a8d22712e777eee982eae8381a8a0e0bee30328
                                            • Opcode Fuzzy Hash: 431273df7c005eff8b086499786a7f8af66af839407972891033f6f8b32510fa
                                            • Instruction Fuzzy Hash: 8D517276A18A5186FB249F29E140238B3B0EF55BA8F6C4171CE4D0B794CB3AE843C7D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3986d2e28db3ad4c814196551e744b7f12e089580c78501851383343d29f5119
                                            • Instruction ID: 1dccf27d1679fcdc32252fe1651a5fac60efed78c79df38fc2d14bac22b9a523
                                            • Opcode Fuzzy Hash: 3986d2e28db3ad4c814196551e744b7f12e089580c78501851383343d29f5119
                                            • Instruction Fuzzy Hash: CC519436A2865186FB249B29E04023CB3B0EF59B58F684171CE4D1B794CB3AE843C7D0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a7def00a57181835e1b5755574f212d41c435eb46ac8bcc91c00ca4f50edce3
                                            • Instruction ID: 22d3bfa39e469415b329e97dfdb6480393f27932c4353d8512a997af8106a661
                                            • Opcode Fuzzy Hash: 0a7def00a57181835e1b5755574f212d41c435eb46ac8bcc91c00ca4f50edce3
                                            • Instruction Fuzzy Hash: 65517376A1865186FB249B29E040239B7F0EF65B68F684171CE8D4B7D4CB3AEC53C790
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5b37b721d2520797c932084b48cf8e5c5b4bbfd8b4955e3aae9fbd8879836657
                                            • Instruction ID: e2c5a9fd44459be72bea95bdc44e110de2886b267a20b1ef744ea1b0f640626a
                                            • Opcode Fuzzy Hash: 5b37b721d2520797c932084b48cf8e5c5b4bbfd8b4955e3aae9fbd8879836657
                                            • Instruction Fuzzy Hash: 0C519332B1865186FF749B29E054678A7B0EF54F58FA84171CE4C1BB94CB3AE843C790
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 56eab1984f79c1160248cb97b5e30aec2666dd062f10dae5dc3084fdbc1595d5
                                            • Instruction ID: 410e0fb9d874c5998332b90855d7bb00bd90982ec8406488098bf259c583d723
                                            • Opcode Fuzzy Hash: 56eab1984f79c1160248cb97b5e30aec2666dd062f10dae5dc3084fdbc1595d5
                                            • Instruction Fuzzy Hash: 1D517136A1866586FB349B29E04023CB7B1EF45F58F6C4171CA8D5B798DB3AE842C790
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e4a792dd5f357ba9ab053cb868b8428acf2d0115ad083e523ed5123ef832f09c
                                            • Instruction ID: 1fb95bb7699e7e6fd5925455447be2edcee02fc2208a06294aa0899f1565887d
                                            • Opcode Fuzzy Hash: e4a792dd5f357ba9ab053cb868b8428acf2d0115ad083e523ed5123ef832f09c
                                            • Instruction Fuzzy Hash: D251B036A1865186FB249B28E44023CA7B1EF44B68FA84171CE4C5B798DB3AEC53C790
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                            • Instruction ID: d1fc4db623e93702d800237c53aa8787cc0ff943f1864e7b62d27e47207d2309
                                            • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                            • Instruction Fuzzy Hash: DD41B552C0D77A44FD959A18D9046B4A6E1EF227A0DDC52F4DDFA133C3CE0FA586C2A1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ErrorLanguagesLastPreferredRestoreThread
                                            • String ID:
                                            • API String ID: 588628887-0
                                            • Opcode ID: 99727cf8dcdef6607af11556971c3c56195fb28ad07658d2c7e33bae879bdea0
                                            • Instruction ID: eb7918071c15eb4ea4afc56a4d999346a8b47ae0c832baefed7e75329d87c412
                                            • Opcode Fuzzy Hash: 99727cf8dcdef6607af11556971c3c56195fb28ad07658d2c7e33bae879bdea0
                                            • Instruction Fuzzy Hash: F641D366B14A5982FF04DF2AF914169A7B2BF48FD0B89A033DE4D97B64DE3CD4428340
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d2714c3464e659e090bf3abd2c253a69a04ee01bde06b43bc588b46e6b5aa8fb
                                            • Instruction ID: aac759dd5948116142d886a39adead45ffabee8627e2e30a91ea5a9f75837a9a
                                            • Opcode Fuzzy Hash: d2714c3464e659e090bf3abd2c253a69a04ee01bde06b43bc588b46e6b5aa8fb
                                            • Instruction Fuzzy Hash: 5A319132A08B4281FB64EF26744016EAAE5EF84BE4F584279EA9957BD5DF3CD0028254
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c3f3f1020485e8a41a296fc930dbc96221e618d45f39aaa63d951921bdf06b5a
                                            • Instruction ID: 4cb68e3d21aa497106b56552870c2c9f1dd90743a503388617b05f3387057464
                                            • Opcode Fuzzy Hash: c3f3f1020485e8a41a296fc930dbc96221e618d45f39aaa63d951921bdf06b5a
                                            • Instruction Fuzzy Hash: D8F06871B182558AEF989F2DB40262977F0FF08380F848479D58D87B04D67C90649F14
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b04046989d87c8dc885ed01c2b3f2aaa9c0b13633c97905e42662c4d2108a614
                                            • Instruction ID: 4f4a0671e2f0c380105d967261da330af1deb3049d9014d1a93fbf76f56a8de5
                                            • Opcode Fuzzy Hash: b04046989d87c8dc885ed01c2b3f2aaa9c0b13633c97905e42662c4d2108a614
                                            • Instruction Fuzzy Hash: 4BA00161908943D2FA44AB01F852021A270BF61308BA904B2D11E514A1AE3DA8408620
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: AddressProc
                                            • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                            • API String ID: 190572456-2208601799
                                            • Opcode ID: e7edea845a9f5d5bc22b5b56991a1be592abbf01ed24a972618679d5ebca8c04
                                            • Instruction ID: f02dc9a28456974b392a974ff0ad0ecb95cb923c1e0fd21bd45d1fd4b9a51180
                                            • Opcode Fuzzy Hash: e7edea845a9f5d5bc22b5b56991a1be592abbf01ed24a972618679d5ebca8c04
                                            • Instruction Fuzzy Hash: 32E1B165A19F03D2FE59AB06B884174A7B6BF18740FEC54B5D80E0A2E4FF7EE5448324
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message_fread_nolock
                                            • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                            • API String ID: 3065259568-2316137593
                                            • Opcode ID: 718a224fae024f93ce7bf74aff3224364058c8fe7df8cac81bb70fe635893a84
                                            • Instruction ID: 662b7e9cc1973c740ce655369c5f125e01c6755085683be16602a384deb8cd0d
                                            • Opcode Fuzzy Hash: 718a224fae024f93ce7bf74aff3224364058c8fe7df8cac81bb70fe635893a84
                                            • Instruction Fuzzy Hash: 2F519E61B0868686FE20B721B4512FAB2B4FF447D4FE84071EE4D87B96EE7CE4418760
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                            • String ID: P%
                                            • API String ID: 2147705588-2959514604
                                            • Opcode ID: 5b6577cad5280a8981d528861e2ae7c646745b175b361903b18278a3a03fe9da
                                            • Instruction ID: cbc0143c425aa8ebfbd370d0653d88456210a59b550e81fd6aca5e740a34f341
                                            • Opcode Fuzzy Hash: 5b6577cad5280a8981d528861e2ae7c646745b175b361903b18278a3a03fe9da
                                            • Instruction Fuzzy Hash: C251C326614BA187EA34AF26B4181BAF7B1FF98B65F044135EBCE43694DF3CD045DA20
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: -$:$f$p$p
                                            • API String ID: 3215553584-2013873522
                                            • Opcode ID: d41d3ed49e0df0b37e7753a00fe59ce424ede8ed11cb6504f669504b003b63f2
                                            • Instruction ID: 3330e501d74191952ea599ec3fcde057b6c2ac7ed0c2bcc5b5afae7bc8431cc3
                                            • Opcode Fuzzy Hash: d41d3ed49e0df0b37e7753a00fe59ce424ede8ed11cb6504f669504b003b63f2
                                            • Instruction Fuzzy Hash: 96128B36A1C24386FF21AA14F0446B9F6B1EF40750FDC4575EA9A46BC4EB3DE5808FA4
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: f$f$p$p$f
                                            • API String ID: 3215553584-1325933183
                                            • Opcode ID: d738f100ea2c585e80d131aafbe2a69e2e0acbd3b76fe5cf90b2b638373c2978
                                            • Instruction ID: 0fc75d74846e8f56ca965e7b906b2dc1c4b5bde427620551751be401176afde8
                                            • Opcode Fuzzy Hash: d738f100ea2c585e80d131aafbe2a69e2e0acbd3b76fe5cf90b2b638373c2978
                                            • Instruction Fuzzy Hash: D7127162E0D18786FF24BA15F0446B9E6F2FF80750FDC4179E69946AC4DB7CE4808BA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message
                                            • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                            • API String ID: 2030045667-3659356012
                                            • Opcode ID: bdc32a4528e991bdae992ceab6fe4be4df97f0d6b6e5334dd80a4d48d71d7056
                                            • Instruction ID: 07eacdd96bd7e0011abd22b7aba9b1c58309f5503214048004b09684e7cf1083
                                            • Opcode Fuzzy Hash: bdc32a4528e991bdae992ceab6fe4be4df97f0d6b6e5334dd80a4d48d71d7056
                                            • Instruction Fuzzy Hash: 56316D21B0865286FE24BB12B8405BAE3B1BF44BD4FEC4072DF4E07A95EE7DE5458720
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                            • String ID: csm$csm$csm
                                            • API String ID: 849930591-393685449
                                            • Opcode ID: 0e2dbf0607b23b863384daf6af73d36f13a88af7ca772ada99fba3557138c94c
                                            • Instruction ID: 74547b1192eefee1eff9080c98779af6bc81c7d66e7605407b4a7ce195996458
                                            • Opcode Fuzzy Hash: 0e2dbf0607b23b863384daf6af73d36f13a88af7ca772ada99fba3557138c94c
                                            • Instruction Fuzzy Hash: C3D1AF32A087428AFF20AF25A4412ADB7B0FF45788FA80175EE8D57B95DF38E190C751
                                            APIs
                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A108A47
                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A108A9E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide
                                            • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                            • API String ID: 626452242-27947307
                                            • Opcode ID: 400f0bdcbd62a4a5536486c2f7426be13d95d078f8c38135e0fc09a91e7db9c0
                                            • Instruction ID: 1e45c14afffb5acb8e81ee901c94e1b45cae760b021d5ee007cc353e67ca7c53
                                            • Opcode Fuzzy Hash: 400f0bdcbd62a4a5536486c2f7426be13d95d078f8c38135e0fc09a91e7db9c0
                                            • Instruction Fuzzy Hash: 42416B32A0CB82C2FA20EF16B84016AFAB5FF84B90FAC4575DA8D47B94DF38D4518710
                                            APIs
                                            • WideCharToMultiByte.KERNEL32(?,00007FF75A1039CA), ref: 00007FF75A108F31
                                              • Part of subcall function 00007FF75A1029C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF75A108AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A1029F4
                                              • Part of subcall function 00007FF75A1029C0: MessageBoxW.USER32 ref: 00007FF75A102AD0
                                            • WideCharToMultiByte.KERNEL32(?,00007FF75A1039CA), ref: 00007FF75A108FA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorLastMessage
                                            • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                            • API String ID: 3723044601-27947307
                                            • Opcode ID: 4b8f80f614b111e99d886447c0377d3fa2ad0085ce50da6436ff273b72e0facb
                                            • Instruction ID: 14926b68615ffda289b53af8a715225aff0cbcfc276b5f144ba535a00fc33577
                                            • Opcode Fuzzy Hash: 4b8f80f614b111e99d886447c0377d3fa2ad0085ce50da6436ff273b72e0facb
                                            • Instruction Fuzzy Hash: E8214821A09B46D6FF10AB26B940069FAB2FF84B90FAC4575DA4D4B794EF3CE5418324
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo$_fread_nolock
                                            • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                            • API String ID: 3231891352-3501660386
                                            • Opcode ID: dd694ad439c35d913334a449757dc7393a4369ae598e4bb01d0977f4e6123465
                                            • Instruction ID: 6df4b0da9814a6d7f68668fd7119cf80e916e2011782e44ca8af8c19bcc5237c
                                            • Opcode Fuzzy Hash: dd694ad439c35d913334a449757dc7393a4369ae598e4bb01d0977f4e6123465
                                            • Instruction Fuzzy Hash: 6E518221E0DA5246FE50BB25B5546B9F2B2AF84BD0FEC00B1E94D866D6EE2CE4008370
                                            APIs
                                            • LoadLibraryExW.KERNEL32(?,?,?,00007FF75A10E67A,?,?,?,00007FF75A10D5AC,?,?,?,00007FF75A10D1A1), ref: 00007FF75A10E44D
                                            • GetLastError.KERNEL32(?,?,?,00007FF75A10E67A,?,?,?,00007FF75A10D5AC,?,?,?,00007FF75A10D1A1), ref: 00007FF75A10E45B
                                            • LoadLibraryExW.KERNEL32(?,?,?,00007FF75A10E67A,?,?,?,00007FF75A10D5AC,?,?,?,00007FF75A10D1A1), ref: 00007FF75A10E485
                                            • FreeLibrary.KERNEL32(?,?,?,00007FF75A10E67A,?,?,?,00007FF75A10D5AC,?,?,?,00007FF75A10D1A1), ref: 00007FF75A10E4F3
                                            • GetProcAddress.KERNEL32(?,?,?,00007FF75A10E67A,?,?,?,00007FF75A10D5AC,?,?,?,00007FF75A10D1A1), ref: 00007FF75A10E4FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                            • String ID: api-ms-
                                            • API String ID: 2559590344-2084034818
                                            • Opcode ID: 5cef7e97cf10635b7adbe76254dad29ae16abfe91812266f9aed7336451ff82a
                                            • Instruction ID: 2be089584d92c508a3985fda1d51a7d98b3e515b2960101a80a7ab5015af485a
                                            • Opcode Fuzzy Hash: 5cef7e97cf10635b7adbe76254dad29ae16abfe91812266f9aed7336451ff82a
                                            • Instruction Fuzzy Hash: 8431B025B1A642D6FE21EB17B4006B5B3B4BF44BA0FAD0575DE5D867D0EE3CE4808328
                                            APIs
                                              • Part of subcall function 00007FF75A108DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF75A102A9B), ref: 00007FF75A108E1A
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF75A107BB1,00000000,?,00000000,00000000,?,00007FF75A10153F), ref: 00007FF75A10768F
                                              • Part of subcall function 00007FF75A102B10: MessageBoxW.USER32 ref: 00007FF75A102BE5
                                            Strings
                                            • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF75A107666
                                            • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF75A1076EA
                                            • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF75A1076A3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                            • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                            • API String ID: 1662231829-3498232454
                                            • Opcode ID: 9bfcf0b62ea921097bc7abb589b6718567d9e6fafddd2668cb98e057143b44d0
                                            • Instruction ID: 6fa6069a9df1a75c7650e9d17b0880500a52ae55415ca9ed7c540cc5e796563c
                                            • Opcode Fuzzy Hash: 9bfcf0b62ea921097bc7abb589b6718567d9e6fafddd2668cb98e057143b44d0
                                            • Instruction Fuzzy Hash: A2315411F1CA4282FE64B725F5592BAF6B1BF987C0FDC0471DA4E467D6EE2CE5048620
                                            APIs
                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF75A102A9B), ref: 00007FF75A108E1A
                                              • Part of subcall function 00007FF75A1029C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF75A108AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A1029F4
                                              • Part of subcall function 00007FF75A1029C0: MessageBoxW.USER32 ref: 00007FF75A102AD0
                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF75A102A9B), ref: 00007FF75A108EA0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$ErrorLastMessage
                                            • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                            • API String ID: 3723044601-876015163
                                            • Opcode ID: 7f97f1849ec178b0ff8ea583991b98c80d8c160445cd7602e716bcd8403426a8
                                            • Instruction ID: e827d9c1fde35947ab8d0eec03f24601fa3b65e2abfbb782d29f22b06f053553
                                            • Opcode Fuzzy Hash: 7f97f1849ec178b0ff8ea583991b98c80d8c160445cd7602e716bcd8403426a8
                                            • Instruction Fuzzy Hash: CB212F22B08A5282FE50EB2AF840069E7B1FF84784BAC4571DB5C47AA9EE2DD5518714
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Value$ErrorLast
                                            • String ID:
                                            • API String ID: 2506987500-0
                                            • Opcode ID: c01302f85cdeeb858ba32c7622f1245fb1706a6e326da58101f8c405cd0a3d75
                                            • Instruction ID: c31a6eabf4ae7aae7e34a6b555d02973bf3c1c1909026b9a9f09a6990584fcd1
                                            • Opcode Fuzzy Hash: c01302f85cdeeb858ba32c7622f1245fb1706a6e326da58101f8c405cd0a3d75
                                            • Instruction Fuzzy Hash: 9B216A24A0C60742FE687721B751179E1728F887B0F9C06B5E92E8B6C6DE2CA40086E0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                            • String ID: CONOUT$
                                            • API String ID: 3230265001-3130406586
                                            • Opcode ID: 56c47cfc8464f7969a639e7ce3d60490623cf8b9b00151c5924cedcf2ef07519
                                            • Instruction ID: 4549e74c66e5f4a1b7ef04e720701f9efeb13b08ebf9711e0b5832a8d216b294
                                            • Opcode Fuzzy Hash: 56c47cfc8464f7969a639e7ce3d60490623cf8b9b00151c5924cedcf2ef07519
                                            • Instruction Fuzzy Hash: F111BB21A18A45C6FB50AB06F844729A6B0FF88FE0F880275EA1D877A4DF3DE9448754
                                            APIs
                                            • GetLastError.KERNEL32(?,?,?,00007FF75A115CBD,?,?,?,?,00007FF75A11F9AF,?,?,00000000,00007FF75A11C196,?,?,?), ref: 00007FF75A11C087
                                            • FlsSetValue.KERNEL32(?,?,?,00007FF75A115CBD,?,?,?,?,00007FF75A11F9AF,?,?,00000000,00007FF75A11C196,?,?,?), ref: 00007FF75A11C0BD
                                            • FlsSetValue.KERNEL32(?,?,?,00007FF75A115CBD,?,?,?,?,00007FF75A11F9AF,?,?,00000000,00007FF75A11C196,?,?,?), ref: 00007FF75A11C0EA
                                            • FlsSetValue.KERNEL32(?,?,?,00007FF75A115CBD,?,?,?,?,00007FF75A11F9AF,?,?,00000000,00007FF75A11C196,?,?,?), ref: 00007FF75A11C0FB
                                            • FlsSetValue.KERNEL32(?,?,?,00007FF75A115CBD,?,?,?,?,00007FF75A11F9AF,?,?,00000000,00007FF75A11C196,?,?,?), ref: 00007FF75A11C10C
                                            • SetLastError.KERNEL32(?,?,?,00007FF75A115CBD,?,?,?,?,00007FF75A11F9AF,?,?,00000000,00007FF75A11C196,?,?,?), ref: 00007FF75A11C127
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Value$ErrorLast
                                            • String ID:
                                            • API String ID: 2506987500-0
                                            • Opcode ID: 97e8c960414e67f8d23f279029ca4c66914050bce4c56b8eca9853fdb1f2f743
                                            • Instruction ID: 20628a099158dfb37532b7b72df2bf2f31c88982dae13e0c3ac290908c61cfce
                                            • Opcode Fuzzy Hash: 97e8c960414e67f8d23f279029ca4c66914050bce4c56b8eca9853fdb1f2f743
                                            • Instruction Fuzzy Hash: A7116028F0C64642FE54B735BA51179E1729F847B0F9C07B5E92E476D6DE2CA44183A0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                            • String ID: Unhandled exception in script
                                            • API String ID: 3081866767-2699770090
                                            • Opcode ID: 035139a28c932b525dc7cac8fcdac5569ee169202821a797d5d04823a4addf63
                                            • Instruction ID: 3b66732e50bfb98df3b38e4a8c4fe64ca9c3d036249f992e28f7618d11ddbcd1
                                            • Opcode Fuzzy Hash: 035139a28c932b525dc7cac8fcdac5569ee169202821a797d5d04823a4addf63
                                            • Instruction Fuzzy Hash: 8D314B76A09A8285FF20EB21F9551E9B3A0FF88784F980175EA4D4BB59DF3CD544C710
                                            APIs
                                            • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF75A108AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A1029F4
                                              • Part of subcall function 00007FF75A108770: GetLastError.KERNEL32(00000000,00007FF75A102A3E,?,?,?,?,?,?,?,?,?,?,?,00007FF75A10101D), ref: 00007FF75A108797
                                              • Part of subcall function 00007FF75A108770: FormatMessageW.KERNEL32 ref: 00007FF75A1087C6
                                              • Part of subcall function 00007FF75A108DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF75A102A9B), ref: 00007FF75A108E1A
                                            • MessageBoxW.USER32 ref: 00007FF75A102AD0
                                            • MessageBoxA.USER32 ref: 00007FF75A102AEC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                            • String ID: %s%s: %s$Fatal error detected
                                            • API String ID: 2806210788-2410924014
                                            • Opcode ID: e540fe95cbcf3c4f9a9ac735379b1c9e9ae60ded60aea03e9d716fb219e4d584
                                            • Instruction ID: 2b98e48ba1e2be6a908ac571cf01cb93da187edb5635bd596240561350773976
                                            • Opcode Fuzzy Hash: e540fe95cbcf3c4f9a9ac735379b1c9e9ae60ded60aea03e9d716fb219e4d584
                                            • Instruction Fuzzy Hash: 26315272628A8182FA30AB11F4516EAB3B4FF847C4F844176E78D46A99DF3CD645CB50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: 2230a043baf354bfbc53885d3c0454218b923bdff90d2529a0827c645eda448d
                                            • Instruction ID: ef664e5f4ece0f31e8301afb8860dc8bbf1ba0dc2c265865b003dfbe92ab34a2
                                            • Opcode Fuzzy Hash: 2230a043baf354bfbc53885d3c0454218b923bdff90d2529a0827c645eda448d
                                            • Instruction Fuzzy Hash: 0FF0AF21A09B06C1FE20AB25B445339A330EF88761F980675D66E452E4DF3DD449C360
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _set_statfp
                                            • String ID:
                                            • API String ID: 1156100317-0
                                            • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                            • Instruction ID: 3f221d371697295569dd44df61a4fcaa85f6aec6768ec656886d319e0652126b
                                            • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                            • Instruction Fuzzy Hash: E111E322E1CA83C1FE543167F56A375E1616F55371FDC06B4E96E066D7CE2EE8408324
                                            APIs
                                            • FlsGetValue.KERNEL32(?,?,?,00007FF75A11B35B,?,?,00000000,00007FF75A11B5F6,?,?,?,?,?,00007FF75A1138BC), ref: 00007FF75A11C15F
                                            • FlsSetValue.KERNEL32(?,?,?,00007FF75A11B35B,?,?,00000000,00007FF75A11B5F6,?,?,?,?,?,00007FF75A1138BC), ref: 00007FF75A11C17E
                                            • FlsSetValue.KERNEL32(?,?,?,00007FF75A11B35B,?,?,00000000,00007FF75A11B5F6,?,?,?,?,?,00007FF75A1138BC), ref: 00007FF75A11C1A6
                                            • FlsSetValue.KERNEL32(?,?,?,00007FF75A11B35B,?,?,00000000,00007FF75A11B5F6,?,?,?,?,?,00007FF75A1138BC), ref: 00007FF75A11C1B7
                                            • FlsSetValue.KERNEL32(?,?,?,00007FF75A11B35B,?,?,00000000,00007FF75A11B5F6,?,?,?,?,?,00007FF75A1138BC), ref: 00007FF75A11C1C8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: d401bd37ec188e315503392ed63ccf632f8c61640092dd5db52b3d7bfa38192e
                                            • Instruction ID: 12dd5a689bdc89b645af18a9d9cce7ea8ad17aabada20a0ee9ceab966ddde483
                                            • Opcode Fuzzy Hash: d401bd37ec188e315503392ed63ccf632f8c61640092dd5db52b3d7bfa38192e
                                            • Instruction Fuzzy Hash: 50118120F4C64681FE59B725BA41179D2B25F843B0F9C47B6E93E867C6DE2CE8018760
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Value
                                            • String ID:
                                            • API String ID: 3702945584-0
                                            • Opcode ID: 3823dbcb479d85c60c076d8b46b677394c7e488c7711611a7772ecc805d169e6
                                            • Instruction ID: d000f44032dc58f1d62511272a3753402db76de2516c0863623673382c5d18d1
                                            • Opcode Fuzzy Hash: 3823dbcb479d85c60c076d8b46b677394c7e488c7711611a7772ecc805d169e6
                                            • Instruction Fuzzy Hash: 07110C18E0C60741FD69B731B551679D1B24F85774FDC0BB6E93E4A2D2DD2CB44192B0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: verbose
                                            • API String ID: 3215553584-579935070
                                            • Opcode ID: 0e1375701995164762774767e6acc307974a31e0cd050619d1c211530d762839
                                            • Instruction ID: bec8b5c17107f68dcaa4b7934f04be381beec70297cd9c223a8e64c2b49529cc
                                            • Opcode Fuzzy Hash: 0e1375701995164762774767e6acc307974a31e0cd050619d1c211530d762839
                                            • Instruction Fuzzy Hash: DC91D322A08A4685FF60AE24E95037DB7B1EF40B94FCC4176DA6D473C5DE3EE40683A0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _invalid_parameter_noinfo
                                            • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                            • API String ID: 3215553584-1196891531
                                            • Opcode ID: de4b53a7bd72cc9a75fc72bdb9aa8b7520de62a16ef0f4afa2e89dc7587c8b22
                                            • Instruction ID: 21485f721fd9d86d2ab2c8583d119911533b3bc8905d281b12313e7c6c0ac624
                                            • Opcode Fuzzy Hash: de4b53a7bd72cc9a75fc72bdb9aa8b7520de62a16ef0f4afa2e89dc7587c8b22
                                            • Instruction Fuzzy Hash: C281A575D08242C9FE756E36A550278B6B0AF51B88FDD82B1CA0B57298DB3EFC119221
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 2395640692-1018135373
                                            • Opcode ID: 81dbbe3a269521ccb6618414f5b7d9ba6a400a48ab9a514a04d3b64c82b69e43
                                            • Instruction ID: 5138e5d11dc63239dbcaf6d5caec9c761875b797e8690428435198176209ec20
                                            • Opcode Fuzzy Hash: 81dbbe3a269521ccb6618414f5b7d9ba6a400a48ab9a514a04d3b64c82b69e43
                                            • Instruction Fuzzy Hash: BD51BD2AA196028BEF14AB15F404679B3B1FF54BC8FA88171DA4E47788DF7DE841C720
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: CallEncodePointerTranslator
                                            • String ID: MOC$RCC
                                            • API String ID: 3544855599-2084237596
                                            • Opcode ID: 93010d95ed42164ec617659bf15c462d53d81a38e330ec23f798dc78275aa1b2
                                            • Instruction ID: c6b8c1e46343c086c406fabca2aeb3fc867d8cb7fe878ce8bf623c3fabd14258
                                            • Opcode Fuzzy Hash: 93010d95ed42164ec617659bf15c462d53d81a38e330ec23f798dc78275aa1b2
                                            • Instruction Fuzzy Hash: 76619032908B8586EB60AB15F4413AAB7A0FF84B94F584275EB8D43B95DF3CE190CB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                            • String ID: csm$csm
                                            • API String ID: 3896166516-3733052814
                                            • Opcode ID: 7fe73a2a5521307b3718a11731218a5d657cd704d90c9c291f237acf2a87c54e
                                            • Instruction ID: 0b09e348a11d2a0ec8b770274ab7252a69ca9347eb3be9ee2d0d4b7b1108d1df
                                            • Opcode Fuzzy Hash: 7fe73a2a5521307b3718a11731218a5d657cd704d90c9c291f237acf2a87c54e
                                            • Instruction Fuzzy Hash: D4517A3290828287FE64AB21A546368B7B0FF54B94FAC8176DA8D47BC5CF3CE651C750
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message$ByteCharMultiWide
                                            • String ID: %s%s: %s$Fatal error detected
                                            • API String ID: 1878133881-2410924014
                                            • Opcode ID: bd3b1ec170c9362c6821fd135409a0077202d763314442d1f4ebee1409f7e8bb
                                            • Instruction ID: 3c9c73ac2741c67e40b6f63b9ca65dc636c6a65f63c61ce96e87d14bb13b195d
                                            • Opcode Fuzzy Hash: bd3b1ec170c9362c6821fd135409a0077202d763314442d1f4ebee1409f7e8bb
                                            • Instruction Fuzzy Hash: 8931217262868282FA20AB11F4516EAF3B5FF847C4F844176E78D46A99DF3CD605CB50
                                            APIs
                                              • Part of subcall function 00007FF75A108DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF75A102A9B), ref: 00007FF75A108E1A
                                            • CreateFileW.KERNEL32(00000000,?,?,00007FF75A103FB9,?,00007FF75A1039CA), ref: 00007FF75A1043A8
                                            • GetFinalPathNameByHandleW.KERNEL32(?,?,00007FF75A103FB9,?,00007FF75A1039CA), ref: 00007FF75A1043C8
                                            • CloseHandle.KERNEL32(?,?,00007FF75A103FB9,?,00007FF75A1039CA), ref: 00007FF75A1043D3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Handle$ByteCharCloseCreateFileFinalMultiNamePathWide
                                            • String ID: \\?\
                                            • API String ID: 2226452419-4282027825
                                            • Opcode ID: 73aa29fffb20bf18054ec36f2ff632c499c886adceaf3567ccea49c9f56a016a
                                            • Instruction ID: f9ea3b3b884c35ca69b86bb2861bd90ea84f1d8b0574474ccce63e9f8f51e172
                                            • Opcode Fuzzy Hash: 73aa29fffb20bf18054ec36f2ff632c499c886adceaf3567ccea49c9f56a016a
                                            • Instruction Fuzzy Hash: 2121D072B0865186FA20AB21F5407AAB261FF887D4F980231DF4E83A94DE3DD548CB14
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                            • String ID:
                                            • API String ID: 2718003287-0
                                            • Opcode ID: f3307fa9b22cd1c245fea77c51432e5876b76cda8032067fabe2ab74fde9908f
                                            • Instruction ID: bfba8f2d1e0eebeaedc58d3e60f49d198420fd731cef0698c0df4c184ebde365
                                            • Opcode Fuzzy Hash: f3307fa9b22cd1c245fea77c51432e5876b76cda8032067fabe2ab74fde9908f
                                            • Instruction Fuzzy Hash: 6ED1F072B08A818AFB10DF65E4402ACB7B1FF447D8B984275DE5D97B99DE38D406C3A0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: LongWindow$DialogInvalidateRect
                                            • String ID:
                                            • API String ID: 1956198572-0
                                            • Opcode ID: c8ffd58409c2a817e2eafc26a907e7367a815fa90807bfabd45e1aee5e5800ec
                                            • Instruction ID: f2b2d5ce01e15fcddc4cf4691f3d160b698c7390e9a29843eb86dff1880b1102
                                            • Opcode Fuzzy Hash: c8ffd58409c2a817e2eafc26a907e7367a815fa90807bfabd45e1aee5e5800ec
                                            • Instruction Fuzzy Hash: 4A118621A0814283FF54A76AF5442BAA2A1FF88B80FDC8071DB490EB99CD7DE4854618
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: _get_daylight$_invalid_parameter_noinfo
                                            • String ID: ?
                                            • API String ID: 1286766494-1684325040
                                            • Opcode ID: 570d5f3b0804fc1bd63e9e9f01e21d80b98fc361e039fa890ee5aecba24efca4
                                            • Instruction ID: 9fa89638e2e559d2230d5b3917166dc1e26f7c74e25e1bd16750b9c1637ace31
                                            • Opcode Fuzzy Hash: 570d5f3b0804fc1bd63e9e9f01e21d80b98fc361e039fa890ee5aecba24efca4
                                            • Instruction Fuzzy Hash: 0041FB12B0C28685FF64AB16B90137AE670EF907A4F9C4275EE6C06AD9DE3ED441C710
                                            APIs
                                            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF75A119DFA
                                              • Part of subcall function 00007FF75A11B700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF75A123B72,?,?,?,00007FF75A123BAF,?,?,00000000,00007FF75A124075,?,?,00000000,00007FF75A123FA7), ref: 00007FF75A11B716
                                              • Part of subcall function 00007FF75A11B700: GetLastError.KERNEL32(?,?,?,00007FF75A123B72,?,?,?,00007FF75A123BAF,?,?,00000000,00007FF75A124075,?,?,00000000,00007FF75A123FA7), ref: 00007FF75A11B720
                                            • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF75A10C335), ref: 00007FF75A119E18
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ErrorFileLanguagesLastModuleNamePreferredRestoreThread_invalid_parameter_noinfo
                                            • String ID: C:\Users\user\Desktop\file.exe
                                            • API String ID: 2553983749-3695852857
                                            • Opcode ID: e0d695942eba2bcfb51646a7552b4669bf5246a03867fd8a1a2782b76189e0f6
                                            • Instruction ID: 1bece5407257436a71e44eb5b9fe24882e911671c9a08fdb10e407366812ac07
                                            • Opcode Fuzzy Hash: e0d695942eba2bcfb51646a7552b4669bf5246a03867fd8a1a2782b76189e0f6
                                            • Instruction Fuzzy Hash: F8418C36A09B5285FF14AF25F8800B8A7B5EF44BD4B984076E94E47B85DE3CE58183A0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID: U
                                            • API String ID: 442123175-4171548499
                                            • Opcode ID: 76bc1a38fdffd9ebe3e6e71a83b0ba687688a06d9a48e83c019cb8b3d6fff0c8
                                            • Instruction ID: 773181727912526ac3a5ef5a76436ef638e89d49a2aee0a111d45c8fee58d259
                                            • Opcode Fuzzy Hash: 76bc1a38fdffd9ebe3e6e71a83b0ba687688a06d9a48e83c019cb8b3d6fff0c8
                                            • Instruction Fuzzy Hash: 1B418122A18A4586EB20DF25F4443AAA7B1FF847D4F984131EA4E87758EF3CD541C764
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory
                                            • String ID: :
                                            • API String ID: 1611563598-336475711
                                            • Opcode ID: 35556daf5145d8784e59f7b9df70c51bbab9d42ea7e8088415664c6c83ecb765
                                            • Instruction ID: 1746a4f761aed5e10b91d8b1a893b49acd29635c74ace6a8230e719ceae0f2a8
                                            • Opcode Fuzzy Hash: 35556daf5145d8784e59f7b9df70c51bbab9d42ea7e8088415664c6c83ecb765
                                            • Instruction Fuzzy Hash: 7621E626B08681C1FF20AB26E44426DB3B2FF84B84FC94275DA8E47284DF7DD945C761
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message$ByteCharMultiWide
                                            • String ID: Error detected
                                            • API String ID: 1878133881-3513342764
                                            • Opcode ID: 339977713d7da472da6bf6cde3ee098e7c711e0ac5788cc03ff0aed866900f2e
                                            • Instruction ID: a221743ded5554ba091b9d9b05da0eba797ae2a6d594d59bc95a57644cc0d072
                                            • Opcode Fuzzy Hash: 339977713d7da472da6bf6cde3ee098e7c711e0ac5788cc03ff0aed866900f2e
                                            • Instruction Fuzzy Hash: DA216072628A8182FB20AB11F4516EAF364FF94784FC41136EB8D47AA9DF3CD605CB50
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: Message$ByteCharMultiWide
                                            • String ID: Fatal error detected
                                            • API String ID: 1878133881-4025702859
                                            • Opcode ID: cc7983d7ddd1ca4fe6b0e820e7fb498cdab092a0274b8afa64f738c4e3f04b3b
                                            • Instruction ID: e0552247e6cdb4aa349d0f3c8d22c10d099f584cd62c3bde54bb2f870ea2cc50
                                            • Opcode Fuzzy Hash: cc7983d7ddd1ca4fe6b0e820e7fb498cdab092a0274b8afa64f738c4e3f04b3b
                                            • Instruction Fuzzy Hash: 4321627262868182FB20AB11F4516EAF364FF84784FC41136E78D47A69DF3CD205CB10
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: ExceptionFileHeaderRaise
                                            • String ID: csm
                                            • API String ID: 2573137834-1018135373
                                            • Opcode ID: fd7208e01f832ae2c3cc6aa9bb96c2aefef2cc6e58d8a602234d9daac72df826
                                            • Instruction ID: ea2404fb15315dc5fe081b0b6a23239582cc9b971655ac1b537d33281c103baf
                                            • Opcode Fuzzy Hash: fd7208e01f832ae2c3cc6aa9bb96c2aefef2cc6e58d8a602234d9daac72df826
                                            • Instruction Fuzzy Hash: CA111932A18B8582EB219B25F44026AB7E5FF88B94FA84270DB8D07765DF3DD551CB40
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2129130780.00007FF75A101000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF75A100000, based on PE: true
                                            • Associated: 00000000.00000002.2129105783.00007FF75A100000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129162475.00007FF75A12C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A13F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129190865.00007FF75A141000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2129237922.00007FF75A143000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7ff75a100000_file.jbxd
                                            Similarity
                                            • API ID: DriveType_invalid_parameter_noinfo
                                            • String ID: :
                                            • API String ID: 2595371189-336475711
                                            • Opcode ID: b3a001ff98c302286219bbad5be65c90682500455353c0d2fccc423422cbb122
                                            • Instruction ID: 3dc66860a4f68beb1380e1afa66f1de9bebf1251ac4c5be4819be5ec45b46f1f
                                            • Opcode Fuzzy Hash: b3a001ff98c302286219bbad5be65c90682500455353c0d2fccc423422cbb122
                                            • Instruction Fuzzy Hash: D201BC21A1C602C6FF20FF61B4612BEA3F0EF44784FC801B5E94E46295EE2CE504CB20

                                            Execution Graph

                                            Execution Coverage:0.1%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:50
                                            Total number of Limit Nodes:2
                                            execution_graph 111367 7ffda3c18382 111396 7ffda3c14110 111367->111396 111369 7ffda3c183c6 111370 7ffda3c183fe 111369->111370 111375 7ffda3c183dd 111369->111375 111371 7ffda3c18420 111370->111371 111372 7ffda3c18417 _Py_Dealloc 111370->111372 111373 7ffda3c18434 111371->111373 111376 7ffda3c1842b _Py_Dealloc 111371->111376 111372->111371 111374 7ffda3c18453 111373->111374 111377 7ffda3c1844d _Py_Dealloc 111373->111377 111378 7ffda3c18472 111374->111378 111381 7ffda3c1846c _Py_Dealloc 111374->111381 111379 7ffda3c183e3 _Py_Dealloc 111375->111379 111380 7ffda3c183ec 111375->111380 111376->111373 111377->111374 111382 7ffda3c18491 111378->111382 111383 7ffda3c1848b _Py_Dealloc 111378->111383 111379->111380 111381->111378 111384 7ffda3c184b0 111382->111384 111385 7ffda3c184aa _Py_Dealloc 111382->111385 111383->111382 111386 7ffda3c184cf 111384->111386 111387 7ffda3c184c9 _Py_Dealloc 111384->111387 111385->111384 111388 7ffda3c184ee 111386->111388 111389 7ffda3c184e8 _Py_Dealloc 111386->111389 111387->111386 111390 7ffda3c1850d 111388->111390 111391 7ffda3c18507 _Py_Dealloc 111388->111391 111389->111388 111392 7ffda3c1852c 111390->111392 111393 7ffda3c18526 _Py_Dealloc 111390->111393 111391->111390 111394 7ffda3c1854b 111392->111394 111395 7ffda3c18545 _Py_Dealloc 111392->111395 111393->111392 111395->111394 111399 7ffda3c14252 111396->111399 111401 7ffda3c1418c 111396->111401 111397 7ffda3c143a5 111398 7ffda3c143b1 PyFloat_FromDouble 111397->111398 111409 7ffda3c143d7 111397->111409 111398->111397 111400 7ffda3c1451e 111398->111400 111402 7ffda3c1430d 111399->111402 111403 7ffda3c142c8 PyBytes_FromStringAndSize 111399->111403 111400->111369 111401->111399 111404 7ffda3c141f8 PyUnicode_FromStringAndSize 111401->111404 111402->111397 111405 7ffda3c14360 PyLong_FromString 111402->111405 111403->111399 111403->111400 111404->111400 111406 7ffda3c14220 PyUnicode_InternInPlace 111404->111406 111405->111400 111405->111402 111406->111401 111407 7ffda3c14420 PyComplex_FromDoubles 111407->111400 111407->111409 111408 7ffda3c14460 PyTuple_New 111408->111400 111410 7ffda3c1444b 111408->111410 111409->111407 111409->111410 111410->111408 111412 7ffda3c144b7 111410->111412 111411 7ffda3c144c4 PyFrozenSet_New 111411->111400 111411->111412 111412->111400 111412->111411 111413 7ffda3c144f0 PySet_Add 111412->111413 111413->111400 111413->111412 111414 7ffda34e2b58 111415 7ffda36d9550 111414->111415 111416 7ffda36d955a TlsFree 111415->111416 111417 7ffda46e1610 94 API calls

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2126916665.00007FFDA46E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDA46E0000, based on PE: true
                                            • Associated: 00000002.00000002.2126888921.00007FFDA46E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000002.00000002.2126938285.00007FFDA46ED000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000002.00000002.2126967457.00007FFDA46FE000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000002.00000002.2126987636.00007FFDA46FF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000002.00000002.2127008102.00007FFDA4704000.00000004.00000001.01000000.00000009.sdmpDownload File
                                            • Associated: 00000002.00000002.2127027976.00007FFDA4705000.00000002.00000001.01000000.00000009.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda46e0000_file.jbxd
                                            Similarity
                                            • API ID: Module_$Constant$Object$String
                                            • String ID: @SECLEVEL=2:ECDH+AESGCM:ECDH+CHACHA20:ECDH+AES:DHE+AES:!aNULL:!eNULL:!aDSS:!SHA1:!AESCCM$ALERT_DESCRIPTION_ACCESS_DENIED$ALERT_DESCRIPTION_BAD_CERTIFICATE$ALERT_DESCRIPTION_BAD_CERTIFICATE_HASH_VALUE$ALERT_DESCRIPTION_BAD_CERTIFICATE_STATUS_RESPONSE$ALERT_DESCRIPTION_BAD_RECORD_MAC$ALERT_DESCRIPTION_CERTIFICATE_EXPIRED$ALERT_DESCRIPTION_CERTIFICATE_REVOKED$ALERT_DESCRIPTION_CERTIFICATE_UNKNOWN$ALERT_DESCRIPTION_CERTIFICATE_UNOBTAINABLE$ALERT_DESCRIPTION_CLOSE_NOTIFY$ALERT_DESCRIPTION_DECODE_ERROR$ALERT_DESCRIPTION_DECOMPRESSION_FAILURE$ALERT_DESCRIPTION_DECRYPT_ERROR$ALERT_DESCRIPTION_HANDSHAKE_FAILURE$ALERT_DESCRIPTION_ILLEGAL_PARAMETER$ALERT_DESCRIPTION_INSUFFICIENT_SECURITY$ALERT_DESCRIPTION_INTERNAL_ERROR$ALERT_DESCRIPTION_NO_RENEGOTIATION$ALERT_DESCRIPTION_PROTOCOL_VERSION$ALERT_DESCRIPTION_RECORD_OVERFLOW$ALERT_DESCRIPTION_UNEXPECTED_MESSAGE$ALERT_DESCRIPTION_UNKNOWN_CA$ALERT_DESCRIPTION_UNKNOWN_PSK_IDENTITY$ALERT_DESCRIPTION_UNRECOGNIZED_NAME$ALERT_DESCRIPTION_UNSUPPORTED_CERTIFICATE$ALERT_DESCRIPTION_UNSUPPORTED_EXTENSION$ALERT_DESCRIPTION_USER_CANCELLED$CERT_NONE$CERT_OPTIONAL$CERT_REQUIRED$ENCODING_DER$ENCODING_PEM$HAS_ALPN$HAS_ECDH$HAS_NPN$HAS_SNI$HAS_SSLv2$HAS_SSLv3$HAS_TLS_UNIQUE$HAS_TLSv1$HAS_TLSv1_1$HAS_TLSv1_2$HAS_TLSv1_3$HOSTFLAG_ALWAYS_CHECK_SUBJECT$HOSTFLAG_MULTI_LABEL_WILDCARDS$HOSTFLAG_NEVER_CHECK_SUBJECT$HOSTFLAG_NO_PARTIAL_WILDCARDS$HOSTFLAG_NO_WILDCARDS$HOSTFLAG_SINGLE_LABEL_SUBDOMAINS$OP_ALL$OP_CIPHER_SERVER_PREFERENCE$OP_ENABLE_MIDDLEBOX_COMPAT$OP_NO_COMPRESSION$OP_NO_RENEGOTIATION$OP_NO_SSLv2$OP_NO_SSLv3$OP_NO_TICKET$OP_NO_TLSv1$OP_NO_TLSv1_1$OP_NO_TLSv1_2$OP_NO_TLSv1_3$OP_SINGLE_DH_USE$OP_SINGLE_ECDH_USE$PROTOCOL_SSLv23$PROTOCOL_TLS$PROTOCOL_TLS_CLIENT$PROTOCOL_TLS_SERVER$PROTOCOL_TLSv1$PROTOCOL_TLSv1_1$PROTOCOL_TLSv1_2$PROTO_MAXIMUM_SUPPORTED$PROTO_MINIMUM_SUPPORTED$PROTO_SSLv3$PROTO_TLSv1$PROTO_TLSv1_1$PROTO_TLSv1_2$PROTO_TLSv1_3$SSL_ERROR_EOF$SSL_ERROR_INVALID_ERROR_CODE$SSL_ERROR_SSL$SSL_ERROR_SYSCALL$SSL_ERROR_WANT_CONNECT$SSL_ERROR_WANT_READ$SSL_ERROR_WANT_WRITE$SSL_ERROR_WANT_X509_LOOKUP$SSL_ERROR_ZERO_RETURN$VERIFY_ALLOW_PROXY_CERTS$VERIFY_CRL_CHECK_CHAIN$VERIFY_CRL_CHECK_LEAF$VERIFY_DEFAULT$VERIFY_X509_PARTIAL_CHAIN$VERIFY_X509_STRICT$VERIFY_X509_TRUSTED_FIRST$_DEFAULT_CIPHERS
                                            • API String ID: 435332665-2778531764
                                            • Opcode ID: 024234832900f10642a9de085ad6faf44d500e50331fea0c541e4cc1c1cdef31
                                            • Instruction ID: ec410d591fa2252394cd51fb84ed61b62f553bd9d4b8ceceaa29d8a0e0c7fca4
                                            • Opcode Fuzzy Hash: 024234832900f10642a9de085ad6faf44d500e50331fea0c541e4cc1c1cdef31
                                            • Instruction Fuzzy Hash: 5F2212A4B1AB1391E6049F16E8A52E623B5AF47FD1F487031CC0E0A776DE6DD18CC758

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1 7ffda3c18382-7ffda3c183c8 call 7ffda3c14110 4 7ffda3c183fe-7ffda3c18408 1->4 5 7ffda3c183ca-7ffda3c183d4 call 7ffda3c20a30 1->5 7 7ffda3c18420-7ffda3c18423 4->7 8 7ffda3c1840a-7ffda3c18415 4->8 9 7ffda3c183d9-7ffda3c183db 5->9 11 7ffda3c18434-7ffda3c1843e 7->11 12 7ffda3c18425-7ffda3c18429 7->12 8->7 10 7ffda3c18417-7ffda3c1841a _Py_Dealloc 8->10 9->4 15 7ffda3c183dd-7ffda3c183e1 9->15 10->7 13 7ffda3c18440-7ffda3c1844b 11->13 14 7ffda3c18453-7ffda3c1845d 11->14 12->11 16 7ffda3c1842b-7ffda3c1842e _Py_Dealloc 12->16 13->14 17 7ffda3c1844d _Py_Dealloc 13->17 18 7ffda3c1845f-7ffda3c1846a 14->18 19 7ffda3c18472-7ffda3c1847c 14->19 20 7ffda3c183e3-7ffda3c183e6 _Py_Dealloc 15->20 21 7ffda3c183ec-7ffda3c183fd 15->21 16->11 17->14 18->19 22 7ffda3c1846c _Py_Dealloc 18->22 23 7ffda3c1847e-7ffda3c18489 19->23 24 7ffda3c18491-7ffda3c1849b 19->24 20->21 22->19 23->24 25 7ffda3c1848b _Py_Dealloc 23->25 26 7ffda3c1849d-7ffda3c184a8 24->26 27 7ffda3c184b0-7ffda3c184ba 24->27 25->24 26->27 28 7ffda3c184aa _Py_Dealloc 26->28 29 7ffda3c184cf-7ffda3c184d9 27->29 30 7ffda3c184bc-7ffda3c184c7 27->30 28->27 32 7ffda3c184ee-7ffda3c184f8 29->32 33 7ffda3c184db-7ffda3c184e6 29->33 30->29 31 7ffda3c184c9 _Py_Dealloc 30->31 31->29 35 7ffda3c1850d-7ffda3c18517 32->35 36 7ffda3c184fa-7ffda3c18505 32->36 33->32 34 7ffda3c184e8 _Py_Dealloc 33->34 34->32 38 7ffda3c18519-7ffda3c18524 35->38 39 7ffda3c1852c-7ffda3c18536 35->39 36->35 37 7ffda3c18507 _Py_Dealloc 36->37 37->35 38->39 40 7ffda3c18526 _Py_Dealloc 38->40 41 7ffda3c18538-7ffda3c18543 39->41 42 7ffda3c1854b-7ffda3c18557 39->42 40->39 41->42 43 7ffda3c18545 _Py_Dealloc 41->43 43->42
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2126792473.00007FFDA3C11000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FFDA3C10000, based on PE: true
                                            • Associated: 00000002.00000002.2126772534.00007FFDA3C10000.00000002.00000001.01000000.00000010.sdmpDownload File
                                            • Associated: 00000002.00000002.2126822537.00007FFDA3C24000.00000002.00000001.01000000.00000010.sdmpDownload File
                                            • Associated: 00000002.00000002.2126845192.00007FFDA3C2A000.00000004.00000001.01000000.00000010.sdmpDownload File
                                            • Associated: 00000002.00000002.2126871176.00007FFDA3C2E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3c10000_file.jbxd
                                            Similarity
                                            • API ID: Dealloc$Unicode_$FromInternPlaceSizeString
                                            • String ID:
                                            • API String ID: 2745024575-0
                                            • Opcode ID: 9280ec3cdcc7626997776a9e16dcb55bba6354dcabd47e52aff5645139c6f96c
                                            • Instruction ID: 35743f70a7a7575ffea1617dea501c0f0830af4974680aa601941fd748cb5a23
                                            • Opcode Fuzzy Hash: 9280ec3cdcc7626997776a9e16dcb55bba6354dcabd47e52aff5645139c6f96c
                                            • Instruction Fuzzy Hash: E451DA35F0FB0281FA55ABA5AD7823C73E6AF54B50F184134C95D227A3CE2FB540939A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 44 7ffda34e2b58-7ffda36d9572 call 7ffda34e1ef1 TlsFree
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2126187999.00007FFDA34E1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDA34E0000, based on PE: true
                                            • Associated: 00000002.00000002.2126164014.00007FFDA34E0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126187999.00007FFDA34ED000.00000020.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126187999.00007FFDA3545000.00000020.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126187999.00007FFDA3559000.00000020.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126187999.00007FFDA3569000.00000020.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126187999.00007FFDA357D000.00000020.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126187999.00007FFDA372D000.00000020.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126503167.00007FFDA372F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126503167.00007FFDA375A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126503167.00007FFDA378C000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126503167.00007FFDA37B1000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126660587.00007FFDA37FF000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126682852.00007FFDA3800000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126709512.00007FFDA3807000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126709512.00007FFDA3824000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            • Associated: 00000002.00000002.2126709512.00007FFDA3828000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda34e0000_file.jbxd
                                            Similarity
                                            • API ID: Free
                                            • String ID:
                                            • API String ID: 3978063606-0
                                            • Opcode ID: 99c7829f09a5c78c67ae0b713d3d91cb04d237d0367d97be12d496e7a1f6d673
                                            • Instruction ID: 9b29f457576b028ca2cd8b581fbef75e0be5d620a040f0b8c36cd249f9b776d9
                                            • Opcode Fuzzy Hash: 99c7829f09a5c78c67ae0b713d3d91cb04d237d0367d97be12d496e7a1f6d673
                                            • Instruction Fuzzy Hash: 1FC01226F074028BF788273CC8762B911A25F48710FA08038F40ED2B92ED0EA8998B09

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2589 7ffda3431410-7ffda344d03f call 7ffda34312ee 2593 7ffda344d091-7ffda344d098 2589->2593 2594 7ffda344d041-7ffda344d062 CRYPTO_malloc 2589->2594 2595 7ffda344d084-7ffda344d090 2593->2595 2596 7ffda344d09a-7ffda344d0e9 call 7ffda34318f7 2593->2596 2594->2596 2597 7ffda344d064-7ffda344d07f ERR_put_error 2594->2597 2600 7ffda344d0eb 2596->2600 2601 7ffda344d137-7ffda344d13a 2596->2601 2597->2595 2604 7ffda344d0ed-7ffda344d0ef 2600->2604 2605 7ffda344d12e-7ffda344d135 2600->2605 2602 7ffda344d16e 2601->2602 2603 7ffda344d13c-7ffda344d13f 2601->2603 2606 7ffda344d175-7ffda344d187 2602->2606 2607 7ffda344d141-7ffda344d144 2603->2607 2608 7ffda344d165-7ffda344d16c 2603->2608 2609 7ffda344d0f1-7ffda344d0f4 2604->2609 2610 7ffda344d125-7ffda344d12c 2604->2610 2605->2606 2615 7ffda344d189-7ffda344d19f 2606->2615 2616 7ffda344d1e8-7ffda344d1f9 2606->2616 2611 7ffda344d15c-7ffda344d163 2607->2611 2612 7ffda344d146-7ffda344d14c 2607->2612 2608->2606 2613 7ffda344d120-7ffda344d123 2609->2613 2614 7ffda344d0f6-7ffda344d0f9 2609->2614 2610->2606 2611->2606 2617 7ffda344d153-7ffda344d15a 2612->2617 2618 7ffda344d14e-7ffda344d151 2612->2618 2613->2606 2619 7ffda344d0fb-7ffda344d0fe 2614->2619 2620 7ffda344d117-7ffda344d11e 2614->2620 2615->2616 2624 7ffda344d1ff 2616->2624 2625 7ffda344d308-7ffda344d30e 2616->2625 2617->2606 2618->2606 2622 7ffda344d10e-7ffda344d115 2619->2622 2623 7ffda344d100-7ffda344d103 2619->2623 2620->2606 2622->2606 2623->2618 2630 7ffda344d105-7ffda344d10c 2623->2630 2626 7ffda344d2ff-7ffda344d306 2624->2626 2627 7ffda344d205-7ffda344d208 2624->2627 2628 7ffda344d382-7ffda344d388 2625->2628 2629 7ffda344d310 2625->2629 2637 7ffda344d28b-7ffda344d296 2626->2637 2631 7ffda344d20a 2627->2631 2632 7ffda344d256-7ffda344d259 2627->2632 2635 7ffda344d284 2628->2635 2636 7ffda344d38e-7ffda344d394 2628->2636 2633 7ffda344d312-7ffda344d318 2629->2633 2634 7ffda344d376-7ffda344d37d 2629->2634 2630->2606 2631->2637 2640 7ffda344d20c-7ffda344d20f 2631->2640 2643 7ffda344d25f-7ffda344d262 2632->2643 2644 7ffda344d2f6-7ffda344d2fd 2632->2644 2641 7ffda344d36a-7ffda344d371 2633->2641 2642 7ffda344d31a-7ffda344d320 2633->2642 2634->2637 2635->2637 2645 7ffda344d3c6-7ffda344d3cd 2636->2645 2646 7ffda344d396-7ffda344d39c 2636->2646 2638 7ffda344d29c 2637->2638 2639 7ffda344d3f6-7ffda344d3f9 2637->2639 2651 7ffda344d2a2-7ffda344d2a5 2638->2651 2652 7ffda344d3ed-7ffda344d3f4 2638->2652 2653 7ffda344d422 2639->2653 2654 7ffda344d3fb-7ffda344d3fe 2639->2654 2647 7ffda344d211-7ffda344d214 2640->2647 2648 7ffda344d24d-7ffda344d254 2640->2648 2641->2637 2649 7ffda344d322-7ffda344d328 2642->2649 2650 7ffda344d35e-7ffda344d365 2642->2650 2657 7ffda344d2ed-7ffda344d2f4 2643->2657 2658 7ffda344d268-7ffda344d26e 2643->2658 2644->2637 2645->2637 2655 7ffda344d39e-7ffda344d3a4 2646->2655 2656 7ffda344d3ba-7ffda344d3c1 2646->2656 2663 7ffda344d244-7ffda344d24b 2647->2663 2664 7ffda344d216-7ffda344d219 2647->2664 2648->2637 2665 7ffda344d352-7ffda344d359 2649->2665 2666 7ffda344d32a-7ffda344d330 2649->2666 2650->2637 2661 7ffda344d3e4-7ffda344d3eb 2651->2661 2662 7ffda344d2ab-7ffda344d2ae 2651->2662 2667 7ffda344d429-7ffda344d472 BIO_snprintf 2652->2667 2653->2667 2668 7ffda344d410-7ffda344d417 2654->2668 2669 7ffda344d400-7ffda344d406 2654->2669 2659 7ffda344d3ae-7ffda344d3b5 2655->2659 2660 7ffda344d3a6-7ffda344d3a9 2655->2660 2656->2637 2657->2637 2670 7ffda344d2e4-7ffda344d2eb 2658->2670 2671 7ffda344d270-7ffda344d276 2658->2671 2659->2637 2660->2637 2661->2667 2678 7ffda344d2b4-7ffda344d2b7 2662->2678 2679 7ffda344d3db-7ffda344d3e2 2662->2679 2663->2637 2672 7ffda344d23b-7ffda344d242 2664->2672 2673 7ffda344d21b-7ffda344d21e 2664->2673 2665->2637 2674 7ffda344d332-7ffda344d338 2666->2674 2675 7ffda344d346-7ffda344d34d 2666->2675 2668->2667 2680 7ffda344d419-7ffda344d420 2669->2680 2681 7ffda344d408-7ffda344d40e 2669->2681 2670->2637 2676 7ffda344d2db-7ffda344d2e2 2671->2676 2677 7ffda344d278-7ffda344d27e 2671->2677 2672->2637 2684 7ffda344d232-7ffda344d239 2673->2684 2685 7ffda344d220-7ffda344d223 2673->2685 2674->2660 2686 7ffda344d33a-7ffda344d341 2674->2686 2675->2637 2676->2637 2677->2635 2677->2660 2682 7ffda344d3d2-7ffda344d3d9 2678->2682 2683 7ffda344d2bd-7ffda344d2c0 2678->2683 2679->2667 2680->2667 2681->2667 2681->2668 2682->2667 2683->2680 2688 7ffda344d2c6-7ffda344d2c9 2683->2688 2684->2637 2685->2660 2687 7ffda344d229-7ffda344d230 2685->2687 2686->2637 2687->2637 2688->2667 2689 7ffda344d2cf-7ffda344d2d6 2688->2689 2689->2667
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_mallocR_put_error
                                            • String ID: ..\s\ssl\ssl_ciph.c$3DES(168)$AEAD$AES(128)$AES(256)$AESCCM(128)$AESCCM(256)$AESCCM8(128)$AESCCM8(256)$AESGCM(128)$AESGCM(256)$ARIAGCM(128)$ARIAGCM(256)$CHACHA20/POLY1305(256)$Camellia(128)$Camellia(256)$DES(56)$DHEPSK$ECDH$ECDHEPSK$GOST$GOST2012$GOST89$GOST89(256)$GOST94$IDEA(128)$MD5$None$PSK$RC2(128)$RC4(128)$RSA$RSAPSK$SEED(128)$SHA1$SHA256$SHA384$SRP$any$unknown
                                            • API String ID: 2513334388-3318204952
                                            • Opcode ID: 4adb48f84b4924d141d5bdbe785b0068ae35efe4cb104e0f7c3573dfabd82022
                                            • Instruction ID: 9a6ed0b286bad8e41d7420c1cb020d8fe176b1777571b3fc920daa807162f17e
                                            • Opcode Fuzzy Hash: 4adb48f84b4924d141d5bdbe785b0068ae35efe4cb104e0f7c3573dfabd82022
                                            • Instruction Fuzzy Hash: 79B13E61F0EF8692F2A48B54A4745B86663BB47340F910532E84DB27E78FBFF944D248
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$O_freeO_zalloc
                                            • String ID: ..\s\ssl\ssl_cert.c$gfffffff$~
                                            • API String ID: 3565116557-3298543876
                                            • Opcode ID: 4f039a7254eafe91479a0f43595177cbf2583de0e40de7fbaf93f6fecf9e5042
                                            • Instruction ID: 5947b48cba1aefde75f83dc4ad70d58f9a288e8622d6f1f5b26b8f51b097948b
                                            • Opcode Fuzzy Hash: 4f039a7254eafe91479a0f43595177cbf2583de0e40de7fbaf93f6fecf9e5042
                                            • Instruction Fuzzy Hash: BED18131B06B8693EA68DB61E4602E973A2FF44740F444435DB9D97786DFBEE1A0C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X_new$R_flagsR_key_lengthX_freeX_reset
                                            • String ID: ..\s\ssl\t1_enc.c$x
                                            • API String ID: 3297287953-3671953471
                                            • Opcode ID: 2d914469476260751de1d5d47814c82ef4c0af32f3bd050d7e00b15e39510e60
                                            • Instruction ID: ce9b7f90321ba59655baae799a5a6ab00f971104d41080276e07492a02220f3a
                                            • Opcode Fuzzy Hash: 2d914469476260751de1d5d47814c82ef4c0af32f3bd050d7e00b15e39510e60
                                            • Instruction Fuzzy Hash: 5DF1E032B0A74285EB70DB12D4617B92792FB8AB88F444034EE4DA7796DF7EE445C708
                                            APIs
                                            • OPENSSL_sk_free.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDA348FB25), ref: 00007FFDA348E7D5
                                            • OPENSSL_sk_free.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDA348FB25), ref: 00007FFDA348E7DE
                                            • CRYPTO_free.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDA348FB25), ref: 00007FFDA348E7F3
                                            • CRYPTO_free.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDA348FB25), ref: 00007FFDA348E808
                                            • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,00007FFDA348FB25), ref: 00007FFDA348EA0F
                                            • OPENSSL_sk_num.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDA348FB25), ref: 00007FFDA348EADF
                                            • OPENSSL_sk_value.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDA348FB25), ref: 00007FFDA348EAF6
                                            • OPENSSL_sk_num.LIBCRYPTO-1_1(?,?,?,?,?,?,?,?,?,?,?,00007FFDA348FB25), ref: 00007FFDA348EB52
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_freeL_sk_numO_free$L_sk_valuememcmp
                                            • String ID: ..\s\ssl\statem\statem_srvr.c$@$P
                                            • API String ID: 1579232405-1224705267
                                            • Opcode ID: 2a70b182a8d067ad67b4936308b03b2b550e428d95b36450b0de4587e2cb5c90
                                            • Instruction ID: cb1acecde3256cff0bb603fa64581b2b80a9e9df434e0056f1e71525b121e6d1
                                            • Opcode Fuzzy Hash: 2a70b182a8d067ad67b4936308b03b2b550e428d95b36450b0de4587e2cb5c90
                                            • Instruction Fuzzy Hash: B4728232B0A68286EB649F25D4607BD37A2FB44B88F144175DE4DA7786CFBEE580C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Y_free$H_freeH_get0_keyO_freeX_freeX_newY_assignY_get0_Y_get1_tls_encodedpointY_newY_security_bits
                                            • String ID: ..\s\ssl\statem\statem_srvr.c$g
                                            • API String ID: 2527737224-1154185083
                                            • Opcode ID: 2b769fa9366c267ee1c862e0bef853748302bc4ea84cfd79cf4f4ff89a962623
                                            • Instruction ID: ffaca575c9b192c442f3f5f4d95639456f2d51e58702a2e6ea55ed4c44ee9cc9
                                            • Opcode Fuzzy Hash: 2b769fa9366c267ee1c862e0bef853748302bc4ea84cfd79cf4f4ff89a962623
                                            • Instruction Fuzzy Hash: 0932B161B0AB4286FB24DB51D4203BD67A2EF45B88F044535DE4DABB86CFBEE5418708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: E_finishY_asn1_find_strY_asn1_get0_info$J_nid2sn$D_sizeP_get_cipherbynameP_get_digestbyname
                                            • String ID: `$gost-mac$gost-mac-12$gost2001$gost2012_256$gost2012_512
                                            • API String ID: 3257371973-344903700
                                            • Opcode ID: 12aa17bb1e1add8f025077da12bd69ef49e8b4f7806767d609dbfba498f52ab9
                                            • Instruction ID: 7d70f2332948bbc69aeef8d6aaf4d31ebc72a753f0632219d763a0d63e84a9a2
                                            • Opcode Fuzzy Hash: 12aa17bb1e1add8f025077da12bd69ef49e8b4f7806767d609dbfba498f52ab9
                                            • Instruction Fuzzy Hash: CAA14372F0AB5286FB209F24E8606A936A6FB4875CF010235E54DD3B96DFBDE451C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c$ALL:!COMPLEMENTOFDEFAULT:!eNULL$TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256$ssl3-md5$ssl3-sha1
                                            • API String ID: 1767461275-1115027282
                                            • Opcode ID: d31de0c650af1bc453eac0a99e941c3a8bbcb35e6f65d6d5bdd2af1ab64f44e3
                                            • Instruction ID: 00ed01568b5b17802a14f7c180ee2acb0435de87e119f4c0e13a38240b254221
                                            • Opcode Fuzzy Hash: d31de0c650af1bc453eac0a99e941c3a8bbcb35e6f65d6d5bdd2af1ab64f44e3
                                            • Instruction Fuzzy Hash: AEA14C31B4AB8285FB549F21D4613B93292EF44B48F440135DA4DAB397EFBEE944C718
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$L_sk_free$L_sk_pop_free$E_free$D_lock_freeE_finishH_freeO_free_ex_dataO_secure_freeX509_
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 4271332762-1080266419
                                            • Opcode ID: 1bb6b90b65bbddc8b251f82ba10e2ef704219c5c8985f6425e8117cd6d9d9a32
                                            • Instruction ID: 2d3dec5ffc6b66e8b73dff8ed6e096deea26cad7e6078755727ed5ff28533d26
                                            • Opcode Fuzzy Hash: 1bb6b90b65bbddc8b251f82ba10e2ef704219c5c8985f6425e8117cd6d9d9a32
                                            • Instruction Fuzzy Hash: B9411221B1AA4281EB50AF31D8767F82322EF85B48F045132E90DEB39BCEAFD545C354
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$X509_get0_pubkeyX_freeX_new
                                            • String ID: ..\s\ssl\statem\statem_lib.c
                                            • API String ID: 1476775391-2839845709
                                            • Opcode ID: e76683827f435abca87562a79174e61183915a5f7e253666586ca727483a72ef
                                            • Instruction ID: 8e554211a1636a5d00780fc557bcce9a6e297d817a543527eb6c9fa61e856f6a
                                            • Opcode Fuzzy Hash: e76683827f435abca87562a79174e61183915a5f7e253666586ca727483a72ef
                                            • Instruction Fuzzy Hash: 6EE19F31B0A74282E7249B12D4603BD77A2FB85B84F444035DA4DA7B9BDFBEE545C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$O_ctrlO_newO_s_fileR_put_error
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 775051240-2723262194
                                            • Opcode ID: 5cc81ffaed0b9ae9af558c7c0ec09825c838d42e43cf024dd1d6977fda48320e
                                            • Instruction ID: 9ef2f8f6cc9c11f3bf45450dfbc725fa25ee9fd8af2d5b8557cc74cc36a835eb
                                            • Opcode Fuzzy Hash: 5cc81ffaed0b9ae9af558c7c0ec09825c838d42e43cf024dd1d6977fda48320e
                                            • Instruction Fuzzy Hash: A1C1F662F196568AFB20CF61D4706BC36A2BB45788F400135DE4EE7B86CFBED1558348
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Digest$Init_exL_cleanse$D_sizeFinal_exX_freeX_newY_free
                                            • String ID: ..\s\ssl\statem\extensions.c$ext binder$res binder
                                            • API String ID: 3409567581-999040457
                                            • Opcode ID: ad398bd95705d5654f3f80e6eda14f3b796389c0bb73dd50416db110d31f1df1
                                            • Instruction ID: 60c923016f529b788f015b34d44928de192ff70466755f192e4c013501b5be82
                                            • Opcode Fuzzy Hash: ad398bd95705d5654f3f80e6eda14f3b796389c0bb73dd50416db110d31f1df1
                                            • Instruction Fuzzy Hash: 66C1A33270A78285EB749F11E4643BA6396FB84784F440036DA4DA7B9ADFFED150CB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_set_init$O_clear_flagsO_get_dataR_put_error$O_freeO_get_initO_pushO_set_nextO_set_shutdownO_up_refO_zalloc
                                            • String ID: ..\s\ssl\bio_ssl.c$=
                                            • API String ID: 2608601196-3341019427
                                            • Opcode ID: 9f8a5afc2c3a4201c34a94a68da72c78de737977bd8e18c9460f781fc46890a1
                                            • Instruction ID: b04eaa12b0c0178f92543eecc7ce69ebe63419302f0b1bdcee5960275fee4e88
                                            • Opcode Fuzzy Hash: 9f8a5afc2c3a4201c34a94a68da72c78de737977bd8e18c9460f781fc46890a1
                                            • Instruction Fuzzy Hash: 97317C10B0FA1642FA18F66795361BD56835F82BD0F004135EC1DABBCBDEAEE542830C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: memcmp$memcpy$O_clear_freeO_mallocR_put_error
                                            • String ID: ..\s\ssl\t1_enc.c$client finished$extended master secret$key expa$master s$n$nsio$server finished
                                            • API String ID: 1314788138-2209449699
                                            • Opcode ID: a62c89e45f9aae1aa45b5aa0e64a944a779c13e5e019ddb20736eb6dd076abf3
                                            • Instruction ID: e89b6923669dbcb29314750762a5b07c2edbf5e82b0b883737ff09079e61091e
                                            • Opcode Fuzzy Hash: a62c89e45f9aae1aa45b5aa0e64a944a779c13e5e019ddb20736eb6dd076abf3
                                            • Instruction Fuzzy Hash: CD51F922B0978185E760CF16E8103A9B7A6FB55BC4F048135EE8C93B56DFBDD184C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X_freeY_free$DigestSign$InitO_memcmpP_sha256X_newY_new_raw_private_key
                                            • String ID: $..\s\ssl\statem\extensions_srvr.c
                                            • API String ID: 1001666065-1533168471
                                            • Opcode ID: 3a3098dfb846c9c121a9c1ce49b31b97a850979f605987c42cedba07d40a0cf7
                                            • Instruction ID: 60d72d3c7b9f7d072a246aa2a22ce150c413a649b87d0a67c77fe409f982cc1e
                                            • Opcode Fuzzy Hash: 3a3098dfb846c9c121a9c1ce49b31b97a850979f605987c42cedba07d40a0cf7
                                            • Instruction Fuzzy Hash: F412F56271A28242EB209B21D4653BD7792EB80784F444031EA9DF77C7DFBEE644CB48
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_new_nullL_sk_pop_freeX509X509_freed2i_
                                            • String ID: ..\s\ssl\statem\statem_srvr.c
                                            • API String ID: 1068509327-348624464
                                            • Opcode ID: 047c664a130ff2571797c587888e675e27d8cbdbf6d03dff3244928dbb089734
                                            • Instruction ID: 5dad75a381e0b6da7e25ba80c31111aaa15d9f28381dceb769907c65089e571f
                                            • Opcode Fuzzy Hash: 047c664a130ff2571797c587888e675e27d8cbdbf6d03dff3244928dbb089734
                                            • Instruction Fuzzy Hash: 1D02F532B0E68186E764CB21E4647B977A2FB84B88F044035DA8DE7B96DFBED540C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1767461275-1080266419
                                            • Opcode ID: bf047813b576c522cd4c32d7226736ccf2e9ab922e80ea57f9722168430ad6f3
                                            • Instruction ID: fb9cb105a5dae020957ca79fef7a74f438a2bc6e1f55ac2f1266e4558197bc45
                                            • Opcode Fuzzy Hash: bf047813b576c522cd4c32d7226736ccf2e9ab922e80ea57f9722168430ad6f3
                                            • Instruction Fuzzy Hash: C6E10836B06B8196EB488F25D5903E973A6FB48B88F080139DF5C9B356DF79E4A0C714
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeX_freeX_new
                                            • String ID: ..\s\ssl\statem\statem_lib.c
                                            • API String ID: 419883019-2839845709
                                            • Opcode ID: 1e3e695176e06fffc797113366f58f9a72a185ed1cb01f87ade92c30fcb11fed
                                            • Instruction ID: 7b5584d421e3d8105f9b034bc55a1089ce65c326f4054d3e58856f5d8540e453
                                            • Opcode Fuzzy Hash: 1e3e695176e06fffc797113366f58f9a72a185ed1cb01f87ade92c30fcb11fed
                                            • Instruction Fuzzy Hash: 1D91933170E64642FAA49B12E4216BA6692EF84BD8F040031EF4DA7B97DFBED5458708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_strdup$O_memdup$D_lock_newO_dup_ex_dataO_mallocR_put_errorX509_chain_up_refX509_up_ref
                                            • String ID: ..\s\ssl\ssl_sess.c
                                            • API String ID: 101854310-2868363209
                                            • Opcode ID: 620caea816c0786f603f172eae432855e06785533cb4aa23b9074fd5e8f499ac
                                            • Instruction ID: a9e2db6f1f2cf713bcbc0b8d5e3dd337aaddd6c9d28d0533db2b7ec5a53cf291
                                            • Opcode Fuzzy Hash: 620caea816c0786f603f172eae432855e06785533cb4aa23b9074fd5e8f499ac
                                            • Instruction Fuzzy Hash: DDA11A32B0ABC282EA558F2499603F833A1FF54784F085635DE8C66797DFB9E1A4D314
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$E_freeX509_Y_free$D_lock_freeL_sk_pop_freeX509_free
                                            • String ID: ..\s\ssl\ssl_cert.c
                                            • API String ID: 3478116879-349359282
                                            • Opcode ID: 5f8a3736d984fe00c60a7365bfcee0a976a29e4624aee41000a6f567bb983a88
                                            • Instruction ID: 939a7c62e50cb9513c6b27ed17c10f3556d9f8184d8cbfbeef063812a9d54f54
                                            • Opcode Fuzzy Hash: 5f8a3736d984fe00c60a7365bfcee0a976a29e4624aee41000a6f567bb983a88
                                            • Instruction Fuzzy Hash: 2A319131F0AB42D5EB54AB61D4A12B86322FF81B84F440031EE5DE7797CFAEE5908704
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_value$L_sk_num$L_sk_push$L_sk_findL_sk_free
                                            • String ID:
                                            • API String ID: 3834244297-0
                                            • Opcode ID: e820d05d0a6482de85e4642c40771d14cb3a8fe6c7d2814c95ac8d24c6e8fb40
                                            • Instruction ID: 35e9bfb2e47c447bb1f46ac2b19e6d7414f9ecd9d7ac5b68ad863d0d9360d3a2
                                            • Opcode Fuzzy Hash: e820d05d0a6482de85e4642c40771d14cb3a8fe6c7d2814c95ac8d24c6e8fb40
                                            • Instruction Fuzzy Hash: 86B10521B0A25287EF649A1590A177E62D3FF84B88F544074DE4EE7787CFBEE4858708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_new_nullL_sk_pop_freeX509X509_freed2i_
                                            • String ID: ..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 1068509327-1507966698
                                            • Opcode ID: 417162d400591d561de6587a29aeb4b4f9203539dd162e8af69dbb0b36e84f8f
                                            • Instruction ID: ae04883a000994cd2a8318c553e6c73677135635a566c7a6b8be37245e5a5bc7
                                            • Opcode Fuzzy Hash: 417162d400591d561de6587a29aeb4b4f9203539dd162e8af69dbb0b36e84f8f
                                            • Instruction Fuzzy Hash: 70E1F63270A68186E720DB15D4603BD7792FB84B84F444136DE8CABB86CFBEE591C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X_iv_length
                                            • String ID: ..\s\ssl\record\ssl3_record_tls13.c$M
                                            • API String ID: 507009519-1371881060
                                            • Opcode ID: cbbd41ce0271423c3d369916ae0a8edbf8c7d68b7c4bdce82aecd0230584fbc8
                                            • Instruction ID: 2e54761ca4bb69899c3849ade116935776e0b2f1651e2fcfe461a0f0163f3536
                                            • Opcode Fuzzy Hash: cbbd41ce0271423c3d369916ae0a8edbf8c7d68b7c4bdce82aecd0230584fbc8
                                            • Instruction Fuzzy Hash: 1DE1D226B0A6828AFB648B25E4203BD77A2FB44788F044135DE4DE7B96DF7ED450C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1767461275-1080266419
                                            • Opcode ID: 285e1bb05ba7f520ab97df2fc0e47dcc5496a50c8059dd24c577624064e1d214
                                            • Instruction ID: bec170d062a9c6823e0c0dfdabb1c71c304b216d2eedfd9321291962f9929d4d
                                            • Opcode Fuzzy Hash: 285e1bb05ba7f520ab97df2fc0e47dcc5496a50c8059dd24c577624064e1d214
                                            • Instruction Fuzzy Hash: A3D18B32B06B8286EBA89F25D5603AD77A2FB44B54F084035DF1D97386DF79E8A0C714
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$O_clear_free$Y_free$L_sk_pop_freeX_free
                                            • String ID: ..\s\ssl\s3_lib.c
                                            • API String ID: 3200038428-4238427508
                                            • Opcode ID: 7de7a4fa8b5b23e8bb9570483213105eaef60e70f7ecbfcd5133edc4a2017182
                                            • Instruction ID: fc1f541f40bdccd1ae96aa5096fffd1d0f3d074205a05e94c368a5d7420c34a0
                                            • Opcode Fuzzy Hash: 7de7a4fa8b5b23e8bb9570483213105eaef60e70f7ecbfcd5133edc4a2017182
                                            • Instruction Fuzzy Hash: 49413225B06B8695EB40EF16D4B57E82322EF81F88F044036DD4D9F3A7CEAED5468354
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$D_sizeDigestO_mallocP_sha256_time64
                                            • String ID: &$..\s\ssl\statem\statem_clnt.c$resumption
                                            • API String ID: 1034084170-1441847574
                                            • Opcode ID: ccdf85ddf26547665e31e6571dd1f93e08b7acb0ad1d4dc524410b283e9881f3
                                            • Instruction ID: 25b88092fd446b5ee8c336aae3522d8661d10d34cdf3a1a837adda3bad133332
                                            • Opcode Fuzzy Hash: ccdf85ddf26547665e31e6571dd1f93e08b7acb0ad1d4dc524410b283e9881f3
                                            • Instruction Fuzzy Hash: 25F1D37270A68185E724CF15E4643BDBBA2FB84B84F048235DA8D97796CFBED590C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeX_freeY_free
                                            • String ID: ..\s\ssl\statem\statem_clnt.c$D:\a\1\s\ssl\packet_local.h$y
                                            • API String ID: 392469334-141503021
                                            • Opcode ID: fdae337394631602f5d79a122da3a82e9ee054d725b34f25c62668988d6f740c
                                            • Instruction ID: a647c6183c9121dc7200e89cb4f3003cc24f1e04efc458117e82b23553ef28ad
                                            • Opcode Fuzzy Hash: fdae337394631602f5d79a122da3a82e9ee054d725b34f25c62668988d6f740c
                                            • Instruction Fuzzy Hash: 7AE1B372B0A64285F7248F12D4607BD2B62EB44B98F044235DE4DA7B97DFBEE185C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: N_free$O_free
                                            • String ID: ..\s\ssl\tls_srp.c
                                            • API String ID: 3506937590-1778748169
                                            • Opcode ID: 991b548c7e5f8c3eedac9789aad45eff1a4166c0cba9e00780eef01bff49c7e0
                                            • Instruction ID: 6c5fd3c5395edabf1213e0509b7ebc00c2de33ed4c3485328d0cf9d563f8b423
                                            • Opcode Fuzzy Hash: 991b548c7e5f8c3eedac9789aad45eff1a4166c0cba9e00780eef01bff49c7e0
                                            • Instruction Fuzzy Hash: 6F212F22F16A8242E715DF61C4613F81316EB94B48F085231FD0C9B297DFAAE6D18364
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_mem_ctrl$L_sk_newL_sk_pushL_sk_sortO_mallocP_get_nameP_get_typeP_zlib
                                            • String ID: ..\s\ssl\ssl_ciph.c
                                            • API String ID: 680475741-1847046956
                                            • Opcode ID: 62ee42c7a7c76134d40cdec2259d5c75cc418fa19301ec1af2a8b91bded5920c
                                            • Instruction ID: 9fdc2646f2c6a942d48e618829aa1ef66b7c093da5426af07cc57f3e5c02179b
                                            • Opcode Fuzzy Hash: 62ee42c7a7c76134d40cdec2259d5c75cc418fa19301ec1af2a8b91bded5920c
                                            • Instruction Fuzzy Hash: 8F111C20F0AB0241FA64AB56E8753B8A297AF45784F440435EA0DE73D7DEEFE4908708
                                            APIs
                                            • BN_bin2bn.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E15A), ref: 00007FFDA34803D7
                                            • BN_bin2bn.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E15A), ref: 00007FFDA34803EB
                                            • BN_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E15A), ref: 00007FFDA34805A8
                                            • BN_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E15A), ref: 00007FFDA34805B0
                                            • BN_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E15A), ref: 00007FFDA34805B8
                                            • DH_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E15A), ref: 00007FFDA34805C0
                                            • EVP_PKEY_free.LIBCRYPTO-1_1(?,?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E15A), ref: 00007FFDA34805C8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: N_free$N_bin2bn$H_freeY_free
                                            • String ID: ..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 2982095754-1507966698
                                            • Opcode ID: 2a12ea7c95104e32635f3a9105b02c5bb099e863f7de12298ca0f2c235696508
                                            • Instruction ID: b0e435201ff932b7b35d9be397855e8b441cd1dc3cff4a02b9d8aad81f0684d5
                                            • Opcode Fuzzy Hash: 2a12ea7c95104e32635f3a9105b02c5bb099e863f7de12298ca0f2c235696508
                                            • Instruction Fuzzy Hash: C6910B62B1E7C146E770DB55A4207BAA792FB85784F005030EE8DA7B47DF7EE5908B04
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 0-745226041
                                            • Opcode ID: 2d5bb378adea2400d7696ae13624d92a5bb514f35b7ba155f8a77dd88cf046aa
                                            • Instruction ID: 4e00f7445205055fe0c7a0c0e300fd6ee168f49fbaecd4d0202f8abfa4445d44
                                            • Opcode Fuzzy Hash: 2d5bb378adea2400d7696ae13624d92a5bb514f35b7ba155f8a77dd88cf046aa
                                            • Instruction Fuzzy Hash: 8B819131B0A74246FB64AB12E4257BA6252EF84BC4F004531DE4DEB787DFBEE5458708
                                            APIs
                                            • OPENSSL_cleanse.LIBCRYPTO-1_1(?,?,00000000,?,?,?,00007FFDA347C60E), ref: 00007FFDA347B8C8
                                            • OPENSSL_cleanse.LIBCRYPTO-1_1(?,?,00000000,?,?,?,00007FFDA347C60E), ref: 00007FFDA347B8D7
                                            • CRYPTO_clear_free.LIBCRYPTO-1_1(?,?,00000000,?,?,?,00007FFDA347C60E), ref: 00007FFDA347B8EB
                                            • CRYPTO_clear_free.LIBCRYPTO-1_1(?,?,00000000,?,?,?,00007FFDA347C60E), ref: 00007FFDA347B8FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_cleanseO_clear_free
                                            • String ID: ..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 778410385-1507966698
                                            • Opcode ID: 782c577024c308073a6ec74741b1d5debe862f46147205d64dafe3fd5ca1deea
                                            • Instruction ID: 06aee9c3ec46c19d50cc677867d1f249fc6e9a553b02b7e9306f41f8022971fc
                                            • Opcode Fuzzy Hash: 782c577024c308073a6ec74741b1d5debe862f46147205d64dafe3fd5ca1deea
                                            • Instruction Fuzzy Hash: CE71E532B1D68182F6209B11E8207FAB751FB89BC8F444135EE8DA7796DFBDD1858704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Y_derive$O_clear_freeO_mallocX_freeX_newY_derive_initY_derive_set_peer
                                            • String ID: ..\s\ssl\s3_lib.c
                                            • API String ID: 2104848214-4238427508
                                            • Opcode ID: d3680417821579d0338fd1fd2f233541748ef9b257303e3de83b838f041bea5a
                                            • Instruction ID: 366ea1ccd0859996cc59da4889aa56259d9771832935cbbb5c1b3f4685d8ab6c
                                            • Opcode Fuzzy Hash: d3680417821579d0338fd1fd2f233541748ef9b257303e3de83b838f041bea5a
                                            • Instruction Fuzzy Hash: DC51D732B0A74242FB64AB12A4202B96792BB84BD4F044431DE5CE7B97DF7EE4418748
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$memcpy$O_freeO_malloc
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 304038429-2723262194
                                            • Opcode ID: ee2b1ca455f7abaebae081c150c37ed4e98fbf117a9246c065abc88b5e49617e
                                            • Instruction ID: 2cee929a5acac4d5d480320cac1b7b8b66c315f5f5e50f58b3c093fc6ad89cf6
                                            • Opcode Fuzzy Hash: ee2b1ca455f7abaebae081c150c37ed4e98fbf117a9246c065abc88b5e49617e
                                            • Instruction Fuzzy Hash: 4B51C331B0E74687EB64DF12D4202A9A756FB85BC4F444431EA4DE7796DFBEE6018308
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$O_free
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 3616133153-1080266419
                                            • Opcode ID: 444372937c9b3ce212e059ec336aa4510f7d10820877fde32f7dd1670c1c857f
                                            • Instruction ID: 60d03e9558aadd9565598ff95f9ac7f35db59c7b06c95738ea0e9bd91986defc
                                            • Opcode Fuzzy Hash: 444372937c9b3ce212e059ec336aa4510f7d10820877fde32f7dd1670c1c857f
                                            • Instruction Fuzzy Hash: 12517C72B09B8281E750DF21D8503AD73A1FB85F88F484135DA5C9B79ADFBAD481CB24
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_unlockD_write_lockH_deleteH_retrieveO_clear_flagsO_freeO_set_flagsO_snprintfR_add_error_datamemcpy
                                            • String ID: ..\s\ssl\record\rec_layer_d1.c$SSL alert number
                                            • API String ID: 928870745-720991377
                                            • Opcode ID: b0756a720c7ca681a88f9697d71b761ad4d16e9e5fe397f34a13d788fcf6975e
                                            • Instruction ID: 31cd13e6668565a2ca1af3c85f5ccd8195c7651a9e66e090272499d4fca4f665
                                            • Opcode Fuzzy Hash: b0756a720c7ca681a88f9697d71b761ad4d16e9e5fe397f34a13d788fcf6975e
                                            • Instruction Fuzzy Hash: 95129632B4A78A85F7689F25D4243B936A2EF44B88F084135DE4D977C6DFBEE4408718
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: strncmp$R_put_error
                                            • String ID: ..\s\ssl\ssl_ciph.c$SECLEVEL=$STRENGTH
                                            • API String ID: 2707563706-3120971754
                                            • Opcode ID: 8e19eabc16801b370c69071912fa1fcb3bcfb1f45c2fa6d02fbc9bc487b033b8
                                            • Instruction ID: 5fd694d1b88e74502dd3eb7e61a713eadac62f966423cfbc3f66f30a1b0ffd06
                                            • Opcode Fuzzy Hash: 8e19eabc16801b370c69071912fa1fcb3bcfb1f45c2fa6d02fbc9bc487b033b8
                                            • Instruction Fuzzy Hash: 0EE1A232B0D2828BE7648E15A06033A77D2FB45784F145136DA8DA7796DBBEE8418F08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$X_free$memcpy
                                            • String ID: ..\s\ssl\statem\statem_dtls.c
                                            • API String ID: 1711549817-3140652063
                                            • Opcode ID: eee93b2b99a0c562da0f4ea43aec890e32df6fb256bc2f9d70f582cd1f8429fe
                                            • Instruction ID: 2eef74aa8c63f41eb756dfee1fd2585806991f63b6d19d8dbcb2c83e88b4a970
                                            • Opcode Fuzzy Hash: eee93b2b99a0c562da0f4ea43aec890e32df6fb256bc2f9d70f582cd1f8429fe
                                            • Instruction Fuzzy Hash: 8AE1BF22B0978196EB249F21D4603BC77A2FB45788F004035EE8DABB96DF7DD1A1C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$O_memcmpO_strndupmemchr
                                            • String ID: ..\s\ssl\statem\extensions_srvr.c$D:\a\1\s\ssl\packet_local.h$k
                                            • API String ID: 2294304191-3589437269
                                            • Opcode ID: ea8cefe799719209480436e9e6fe518de4c09b6204fee041a552dd61f934f91e
                                            • Instruction ID: f2a862ff1110a1922192c0a0de36d5caf9447ece598b1379868b187e269fbd4b
                                            • Opcode Fuzzy Hash: ea8cefe799719209480436e9e6fe518de4c09b6204fee041a552dd61f934f91e
                                            • Instruction Fuzzy Hash: 7A611861F0A78546E7608F25E02077D7792FB45784F444134DA4CAB786CFBEE581CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_zalloc$J_nid2snP_get_digestbyname
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 4284552970-1080266419
                                            • Opcode ID: f6cc87e6b05e7f55d33cb5daac34941b4575cab0649bc418a77131c6fd7575bc
                                            • Instruction ID: 2e322e5ab9cbe4f6f0abb4d230f3389ed3a1c15e6e89c145fe444afefbc1f752
                                            • Opcode Fuzzy Hash: f6cc87e6b05e7f55d33cb5daac34941b4575cab0649bc418a77131c6fd7575bc
                                            • Instruction Fuzzy Hash: A4312221B0AB9186EB109F25E4613B977A2EF01780F480135EB8D9B787CEBFE551C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_mem_ctrl$L_sk_newL_sk_pushL_sk_sortO_mallocP_get_type
                                            • String ID: ..\s\ssl\ssl_ciph.c
                                            • API String ID: 2525466407-1847046956
                                            • Opcode ID: 633e3f8a5b1f2117c4688fb6f59ea72fef34a6c0fab0f04b0c1034370f3ab914
                                            • Instruction ID: 8c9e722436e99f3369adc13ccaae3a70ea0cd0901cbe6b9d88f180743ae32b4b
                                            • Opcode Fuzzy Hash: 633e3f8a5b1f2117c4688fb6f59ea72fef34a6c0fab0f04b0c1034370f3ab914
                                            • Instruction Fuzzy Hash: 3811FA20F0BA0241FA64AB56E8753B8A257AF85780F441435EA4DE73D7DEEEE4908358
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_flagsO_set_dataO_set_initO_zallocR_put_error
                                            • String ID: ..\s\ssl\bio_ssl.c$=
                                            • API String ID: 3341103989-3341019427
                                            • Opcode ID: 48d02881f3e19af4b2fca5a1682b77c9912c6a67a56c44d3c613b17f343fb1eb
                                            • Instruction ID: 36131273fb90299c1aaae196fcd9bfa0d350f8a0b837aff192a939c3221f9948
                                            • Opcode Fuzzy Hash: 48d02881f3e19af4b2fca5a1682b77c9912c6a67a56c44d3c613b17f343fb1eb
                                            • Instruction Fuzzy Hash: C5113A62B0D18381D7419F29E4702EC7B629B46754F0C8130E78843387DD6ED454CB04
                                            APIs
                                            • EVP_CIPHER_CTX_free.LIBCRYPTO-1_1(?,00000000,?,?,?,00007FFDA348202D), ref: 00007FFDA34824DA
                                            • EVP_MD_CTX_free.LIBCRYPTO-1_1(?,00000000,?,?,?,00007FFDA348202D), ref: 00007FFDA34824E3
                                            • CRYPTO_free.LIBCRYPTO-1_1(?,00000000,?,?,?,00007FFDA348202D), ref: 00007FFDA34824F8
                                            • CRYPTO_free.LIBCRYPTO-1_1(?,00000000,?,?,?,00007FFDA348202D), ref: 00007FFDA348250E
                                            • CRYPTO_free.LIBCRYPTO-1_1(?,00000000,?,?,?,00007FFDA348202D), ref: 00007FFDA3482523
                                              • Part of subcall function 00007FFDA3481BE0: CRYPTO_malloc.LIBCRYPTO-1_1(?,00007FFDA3480F48), ref: 00007FFDA3481C1B
                                              • Part of subcall function 00007FFDA3481BE0: ERR_put_error.LIBCRYPTO-1_1(?,00007FFDA3480F48), ref: 00007FFDA3481C43
                                            • CRYPTO_free.LIBCRYPTO-1_1(?,00000000,?,?,?,00007FFDA348202D), ref: 00007FFDA34826BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$X_free$O_mallocR_put_error
                                            • String ID: ..\s\ssl\statem\statem_dtls.c
                                            • API String ID: 4216106018-3140652063
                                            • Opcode ID: 3b5a834cd0931668b7dabf0015a8e798cfc2ec530cd0dbe8395635f56e623f78
                                            • Instruction ID: 91fbb465551774750ae93e10d9914436f6c35710740b5efd404477a0e25e3979
                                            • Opcode Fuzzy Hash: 3b5a834cd0931668b7dabf0015a8e798cfc2ec530cd0dbe8395635f56e623f78
                                            • Instruction Fuzzy Hash: E2B1D272B0AB8583DB20CF15E4602A977A2FB55B84F444232DB8D93B96DF7EE544C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: memcpy$O_memcmpX_freeX_new
                                            • String ID: ..\s\ssl\statem\statem_lib.c$l
                                            • API String ID: 1067491572-3956761411
                                            • Opcode ID: acda3287ec944384e390f27aac9f73a965c0d0eedbfe8bfcbca0d2146e9d830f
                                            • Instruction ID: ec2ca3118773bce463f499a445cf78a3762008528640bffa9304b91511809365
                                            • Opcode Fuzzy Hash: acda3287ec944384e390f27aac9f73a965c0d0eedbfe8bfcbca0d2146e9d830f
                                            • Instruction Fuzzy Hash: 1791A232B0A64287E7608F15D4603AD37A2FB44F88F184431DA4DA7796CFBED581C745
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\statem\statem_srvr.c$D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 0-1534007912
                                            • Opcode ID: 8db9a76156c758893337f56ecc400264bf03f8dfbc5887079c12b62c9d52616b
                                            • Instruction ID: d42c044d09bfcfba934163d589bd182e488845a03f0cb8d979fb58c242aa0501
                                            • Opcode Fuzzy Hash: 8db9a76156c758893337f56ecc400264bf03f8dfbc5887079c12b62c9d52616b
                                            • Instruction Fuzzy Hash: 38510672B09A8186F7608B10D4647EDBB62FB84BC8F044131DA8CA7796DFBDD695CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_memdup
                                            • String ID: ..\s\ssl\statem\extensions_cust.c
                                            • API String ID: 3962629258-3973221358
                                            • Opcode ID: 39bba86c631204e598ff62e639f37f5f73046ccd44f2d89d291084cdaa1d33ad
                                            • Instruction ID: 6a2886635608c408cd93a978cbe912d2f88bce5129e53941f101c37f0a88b847
                                            • Opcode Fuzzy Hash: 39bba86c631204e598ff62e639f37f5f73046ccd44f2d89d291084cdaa1d33ad
                                            • Instruction Fuzzy Hash: 9A418072B0BA4281EA61DF11E4606A9A7A6FB84794F054036DE4C97796EFBED181C304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: F_parse_listR_put_error
                                            • String ID: ..\s\ssl\t1_lib.c
                                            • API String ID: 2930615231-1643863364
                                            • Opcode ID: 382398ce1e9e59ad8d39d2fd9efb64de3a1cfd8ab58c05187b18d7c0c9fdcea3
                                            • Instruction ID: dfe2a0be686f8fd2173e4b8c69939ca52e98a478aaa35c5300248163c8c59fbf
                                            • Opcode Fuzzy Hash: 382398ce1e9e59ad8d39d2fd9efb64de3a1cfd8ab58c05187b18d7c0c9fdcea3
                                            • Instruction Fuzzy Hash: BD418E32B0EB9286E720DF15E8607BA7362FB84780F414135D94DA3B86DFBEE5458708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\record\rec_layer_d1.c
                                            • API String ID: 2581946324-1306860146
                                            • Opcode ID: fb6124d55f135ef5635896bfe7be1fe4b4baa3c7022afa38b3d420df6c7c7c16
                                            • Instruction ID: 2e7c56443200d5bc3119d34d54d9006878c884d31d85563eb1beb111fc2912b1
                                            • Opcode Fuzzy Hash: fb6124d55f135ef5635896bfe7be1fe4b4baa3c7022afa38b3d420df6c7c7c16
                                            • Instruction Fuzzy Hash: 0C416012F0AB8681EA44EB16C5B027867A2FF85FC8F005531DE0D97757EFAEE4918304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$D_lock_newO_freeO_zalloc
                                            • String ID: ..\s\ssl\ssl_cert.c$B
                                            • API String ID: 3411496311-1824687510
                                            • Opcode ID: 889f6ff03f0a5cde185c8a82e368881b76037717ce5f1044877cf7ef1abf095c
                                            • Instruction ID: d4358ae1d4785cb91e285c984a09f19c258eacad9372be6499525164a50eb507
                                            • Opcode Fuzzy Hash: 889f6ff03f0a5cde185c8a82e368881b76037717ce5f1044877cf7ef1abf095c
                                            • Instruction Fuzzy Hash: 16118E71B0A74286F7119F61E4213E93792EB44708F880535DD4C9A397EFBEE685CB18
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_flagsO_freeO_get_dataO_get_initO_get_shutdownO_set_init
                                            • String ID: ..\s\ssl\bio_ssl.c
                                            • API String ID: 3531300166-4039210333
                                            • Opcode ID: b42fafa9bfc7a4b513fe56510db0a8dc245545e9252ab44829cdd493434299b0
                                            • Instruction ID: c80377600f86b9bfb24ae9a8fef124364518bd37d21d364ecc31edba142ad976
                                            • Opcode Fuzzy Hash: b42fafa9bfc7a4b513fe56510db0a8dc245545e9252ab44829cdd493434299b0
                                            • Instruction Fuzzy Hash: E9014F50F0BA4741FA58B6A699722B912835F86790F081130FD1EE77CBDF9EE4918218
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeY_free$Y_get1_tls_encodedpoint
                                            • String ID: ..\s\ssl\statem\extensions_srvr.c
                                            • API String ID: 3595761781-1853348325
                                            • Opcode ID: fae162c317aebd6ddf97c05b2bfa3dbbdf0d1709d28723a3ddef04a853f88177
                                            • Instruction ID: 65be67e5d2df7a7079b9765b6b6c79f799378e20bcb3ccff432d589e77d0d5cb
                                            • Opcode Fuzzy Hash: fae162c317aebd6ddf97c05b2bfa3dbbdf0d1709d28723a3ddef04a853f88177
                                            • Instruction Fuzzy Hash: 05719021B0A74685F7249B12F5606BD6792EF85BC4F180030DE4CA7B9BDFAEE541CB08
                                            APIs
                                            • CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDA349255C
                                              • Part of subcall function 00007FFDA3431C08: CRYPTO_malloc.LIBCRYPTO-1_1 ref: 00007FFDA34488C9
                                              • Part of subcall function 00007FFDA3431C08: memset.VCRUNTIME140 ref: 00007FFDA34488F7
                                              • Part of subcall function 00007FFDA3431C08: memcpy.VCRUNTIME140 ref: 00007FFDA3448933
                                              • Part of subcall function 00007FFDA3431C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDA3448956
                                              • Part of subcall function 00007FFDA3431C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDA34489BD
                                              • Part of subcall function 00007FFDA3431C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDA3448A38
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_free$O_mallocmemcpymemset
                                            • String ID: ..\s\ssl\statem\statem_srvr.c
                                            • API String ID: 2470733610-348624464
                                            • Opcode ID: 87e23bd9479a19a585572a2706d0a16145bdd5620c84a5ddc2e0aaeba8d5d462
                                            • Instruction ID: 5f6ea086de01c2618501b6b0f159a2f3768bb4ee3dc0d1ef3a112428f7ca5106
                                            • Opcode Fuzzy Hash: 87e23bd9479a19a585572a2706d0a16145bdd5620c84a5ddc2e0aaeba8d5d462
                                            • Instruction Fuzzy Hash: BC610331B0A68681E7A48B16E4747BD6692EF84B94F084131CE4CAB7D7CFBEE4418708
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\s3_enc.c
                                            • API String ID: 0-1839494539
                                            • Opcode ID: 92ea87f474033a6bd3c870b806afe99ffc5678929a59eff6cda3fd44ead199dd
                                            • Instruction ID: f55e652d689f1eca1f802e7a53ccc503b301fcc1760176d24b6a1bbe6865b5f5
                                            • Opcode Fuzzy Hash: 92ea87f474033a6bd3c870b806afe99ffc5678929a59eff6cda3fd44ead199dd
                                            • Instruction Fuzzy Hash: AC518C32709B8196EB948F26E0903AD77A1FB88B90F144136DF8C97765DF7AD0A5CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_zallocR_put_error
                                            • String ID: ..\s\ssl\packet.c$b
                                            • API String ID: 2718799170-1717309047
                                            • Opcode ID: 8bfd1c6c49e0ed3e29f783e3e69fe53ba24d995af492483d6313054a0c38b9bc
                                            • Instruction ID: 664ba16e9325f9015e2ebe540ea5c64340452b9f01c8674aac6da058e2a03a96
                                            • Opcode Fuzzy Hash: 8bfd1c6c49e0ed3e29f783e3e69fe53ba24d995af492483d6313054a0c38b9bc
                                            • Instruction Fuzzy Hash: 7151E762B0AB4A81EF58CB25D56036873A2EB44BA4F104235DA6C933D6DFBED844C348
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: N_bin2bnN_is_zeroN_ucmpO_freeO_strdup
                                            • String ID: ..\s\ssl\statem\statem_srvr.c
                                            • API String ID: 3996552382-348624464
                                            • Opcode ID: 9b0eda87b6ec77cfa6a07f02b90028ce4069eafe86289c25d00f66e17d780532
                                            • Instruction ID: 367808af851d13c7c20900f459b6a28f5f7df4f0b8ff751c70386a2d6d7082c4
                                            • Opcode Fuzzy Hash: 9b0eda87b6ec77cfa6a07f02b90028ce4069eafe86289c25d00f66e17d780532
                                            • Instruction Fuzzy Hash: C6312732709A8281EB60CF21E8657BD67A2FB84B88F044131DE4CDB796DF7ED5918704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$O_malloc
                                            • String ID: ..\s\ssl\t1_lib.c
                                            • API String ID: 1108683871-1643863364
                                            • Opcode ID: a60fca56b0b3966003a55dc8342f5ccc0e6a6bb1fb1fe784f160ef7a5e08ebe3
                                            • Instruction ID: 7f038547124a15c0927cca7de134d6b81d620a36db480d478eb3d3ec10f501d1
                                            • Opcode Fuzzy Hash: a60fca56b0b3966003a55dc8342f5ccc0e6a6bb1fb1fe784f160ef7a5e08ebe3
                                            • Instruction Fuzzy Hash: 1C310032B0E75686E720CF55E8207BAA252EB44780F414431EA4DD7B96EFFEE5058708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_mallocR_put_error
                                            • String ID: ..\s\ssl\t1_lib.c
                                            • API String ID: 2513334388-1643863364
                                            • Opcode ID: 98af37487f8f3ef961c090f28ff60e57766f8aa80a98076616169e6bb4540e77
                                            • Instruction ID: 9f2344d1b54ee10ba390cc835108b939394dbc2afd89425e3326a44aa4aefe71
                                            • Opcode Fuzzy Hash: 98af37487f8f3ef961c090f28ff60e57766f8aa80a98076616169e6bb4540e77
                                            • Instruction Fuzzy Hash: CC316B32B0E78285E7609F12E4207EA7366EB84B84F444135DE8D97B46DF7EE144C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$O_freeO_mallocmemcpy
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 1339073354-2723262194
                                            • Opcode ID: 381eec62572a7176f42a0262f48d9dde064d866098110c050ba8ec69db1db139
                                            • Instruction ID: 0169e9e183bd07e778e89ff58439de6e2d2e1d204faa060ecc897ffe87558104
                                            • Opcode Fuzzy Hash: 381eec62572a7176f42a0262f48d9dde064d866098110c050ba8ec69db1db139
                                            • Instruction Fuzzy Hash: 6421B461B0E64586EB50EF12E5202A9ABA2FF857C0F444031EF4C97B97DFBED5108708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_mallocR_put_errormemcpy
                                            • String ID: ..\s\ssl\t1_lib.c
                                            • API String ID: 92311482-1643863364
                                            • Opcode ID: 5ca80b6831d56479da9b61cdfef64967fe1f7eaead0a4867cde06b1e05385972
                                            • Instruction ID: 0225830822eaf85cc4a74e92f6859f52a434d01dd8e7a34e83f91d2e188f6b20
                                            • Opcode Fuzzy Hash: 5ca80b6831d56479da9b61cdfef64967fe1f7eaead0a4867cde06b1e05385972
                                            • Instruction Fuzzy Hash: 1D216F31B0E74285E7109F16E4202AA7752FB45BD4F444435EE4C97B4ADFBEE1458718
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$Y_freeY_get1_tls_encodedpoint
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 4042585043-592572767
                                            • Opcode ID: 2bcc911db4a72dfc2b0e7a29b7c82d8670fc5e786f8c662df42f5cbbbc828d64
                                            • Instruction ID: 0f12aa5774f8ed4539d033d403bf893b5dd455e7bc4d9d4d59088fe100e4b4eb
                                            • Opcode Fuzzy Hash: 2bcc911db4a72dfc2b0e7a29b7c82d8670fc5e786f8c662df42f5cbbbc828d64
                                            • Instruction Fuzzy Hash: 0671933170D75186EA649F12D8603BA7792FB85B80F084035EE4DA7B9ADF7EE5118708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$O_strdup
                                            • String ID: ..\s\ssl\statem\extensions.c$p
                                            • API String ID: 3211362174-2468000666
                                            • Opcode ID: 2068a348a5a17e172b9380dba34c8c5b6710b03b8af4628bf303ad2f3fc6c35a
                                            • Instruction ID: ecbcd8dd66f479985c834fcd124bcdce6de09acec4853879b1292a38f7a0f143
                                            • Opcode Fuzzy Hash: 2068a348a5a17e172b9380dba34c8c5b6710b03b8af4628bf303ad2f3fc6c35a
                                            • Instruction Fuzzy Hash: 9A71B332B0A64285F7609F15D4603B93B93EB80B84F081135DE4CA7796CFBEE555CB48
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_malloc
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 2609694610-592572767
                                            • Opcode ID: eb8646cc14ad7946747ce7eb3af944775ceab7122389636ce27dacd7aa004322
                                            • Instruction ID: 235eebeef392d39802651ab5086d494daaeeab83d2569d74b4b9a197fb398aa8
                                            • Opcode Fuzzy Hash: eb8646cc14ad7946747ce7eb3af944775ceab7122389636ce27dacd7aa004322
                                            • Instruction Fuzzy Hash: 24618D72709B8185E750CF11D4A02AD77A6FB85BD8F084235DA4C97B9ACFBED2A1C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$O_memdup
                                            • String ID: ..\s\ssl\statem\extensions_srvr.c$D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 3545228654-2178723975
                                            • Opcode ID: 6b1fb058464558bf4c2905c61fd578a9dd662c9e315f15e99a82039453d78e0a
                                            • Instruction ID: d0b789ab4085e2c05e0eb55d5b6f9cffed20a4151461695ba4f3e35c36fdf7ba
                                            • Opcode Fuzzy Hash: 6b1fb058464558bf4c2905c61fd578a9dd662c9e315f15e99a82039453d78e0a
                                            • Instruction Fuzzy Hash: E251E272B19BC282E7648F25E4107E977A2FB45B84F044134EA8CA7B56CFBDE291C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_unlock$D_read_lockmemset
                                            • String ID: ..\s\ssl\ssl_sess.c
                                            • API String ID: 229716220-2868363209
                                            • Opcode ID: 388a0833509183cc25da2882dab4e5f1c8b99a13d93ed3c32a49070179191ef0
                                            • Instruction ID: f9b2405b6ed3e5708b5abe5a1ae38568fdac85fe86224eadbf37e19ed9f765ea
                                            • Opcode Fuzzy Hash: 388a0833509183cc25da2882dab4e5f1c8b99a13d93ed3c32a49070179191ef0
                                            • Instruction Fuzzy Hash: 4451D932B1DA8185EB648F15E4653F963A1FB84B84F140031DB4C9BB96EFBED6618708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_reallocR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1389097454-1080266419
                                            • Opcode ID: 27a81299e4397cce453b4bb35cf925dfa7061ef0ef0b4ee9c43420466c295b87
                                            • Instruction ID: 5c8e3eeb3e38991088347e1c2b00bfd523ff559ac843b27d22d8794806cb8475
                                            • Opcode Fuzzy Hash: 27a81299e4397cce453b4bb35cf925dfa7061ef0ef0b4ee9c43420466c295b87
                                            • Instruction Fuzzy Hash: 72312232B0A78597E715CF25A8102BA7791FB05B88F440131EE5CA77A2DF7EE562C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$O_memdupR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 864655289-1080266419
                                            • Opcode ID: 664e1de1e675a6c1586ef9858d97950876fe17865ec3ff71ba134caa316c6ff8
                                            • Instruction ID: 5636481f0978355f06453138c4db609ab14eec32bdd5c9d6ff0d77874b1f099e
                                            • Opcode Fuzzy Hash: 664e1de1e675a6c1586ef9858d97950876fe17865ec3ff71ba134caa316c6ff8
                                            • Instruction Fuzzy Hash: 4C21D635F1A69282EB108B21E4217787762FF41789F540071DE0DA7B96DF6FE542C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$O_mallocR_put_error
                                            • String ID: ..\s\ssl\t1_lib.c
                                            • API String ID: 2563039504-1643863364
                                            • Opcode ID: f48377fe411956e23c2321321ebbe80bd26c650d6c1dc80da4a23891d7b107f2
                                            • Instruction ID: 4a8720a43fd2b52e09ed6b424c2e7b4280af25ea0431ca2167eeeea4579e7582
                                            • Opcode Fuzzy Hash: f48377fe411956e23c2321321ebbe80bd26c650d6c1dc80da4a23891d7b107f2
                                            • Instruction Fuzzy Hash: C031A432B0EB5681E720CB15D4202A9B762EB89B84F454031DA5CD3B97EFBFE551C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_run_once$R_put_error
                                            • String ID: ..\s\ssl\ssl_init.c
                                            • API String ID: 511881677-1166085723
                                            • Opcode ID: b6486afcc2948308af3d46dab6f91d643cdf533d18b32615e64ce4e50eae642a
                                            • Instruction ID: 63d9b33561ac6542fdffdb195815e8ef47a23831eb460891328c1db4dc33b889
                                            • Opcode Fuzzy Hash: b6486afcc2948308af3d46dab6f91d643cdf533d18b32615e64ce4e50eae642a
                                            • Instruction Fuzzy Hash: B3215021F0A70386FB558B19E9603B56392AF85344F484434E90EE6397EEBEED518718
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_mallocR_put_errormemcpy
                                            • String ID: ..\s\ssl\ssl_sess.c
                                            • API String ID: 92311482-2868363209
                                            • Opcode ID: b07a6821eb3aac88ff818e32af481811fceebcac28d8e0a41e6ba6b0370d1c36
                                            • Instruction ID: 369c7788a3591dd8859d785f03be970ed81868acbb3f8e84c56c11b0e4fb59d5
                                            • Opcode Fuzzy Hash: b07a6821eb3aac88ff818e32af481811fceebcac28d8e0a41e6ba6b0370d1c36
                                            • Instruction Fuzzy Hash: 9D21733670AB8181FB108F15E4602A97762FB84B84F544031DF8CA77AADF7ED552C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_pop_freeO_freeX509_freeY_free
                                            • String ID: ..\s\ssl\ssl_cert.c
                                            • API String ID: 1247630535-349359282
                                            • Opcode ID: 6386c60520db15d77945b03bba99298406683d385e03fec6b8e3265512c2371a
                                            • Instruction ID: 0f09ca0285568e0eb7c0a1db54cf31bb4e2101d78729b608562275eb3b6a07ad
                                            • Opcode Fuzzy Hash: 6386c60520db15d77945b03bba99298406683d385e03fec6b8e3265512c2371a
                                            • Instruction Fuzzy Hash: 7B018E32B1AB55C2EB109B20E06016C7365FB84F88F040131FA8DA7B4ACFBED151C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$L_sk_pop_free
                                            • String ID: ..\s\ssl\ssl_conf.c
                                            • API String ID: 1650471521-1527728938
                                            • Opcode ID: 931636c360a65359e9d0292b47e619b5ca8f2a780e46915865d3cef0e9c9ef19
                                            • Instruction ID: 932d379dc4f50f5f3c9a8201aeeb369e75b4bdea0f9f4138dbabf552e473893e
                                            • Opcode Fuzzy Hash: 931636c360a65359e9d0292b47e619b5ca8f2a780e46915865d3cef0e9c9ef19
                                            • Instruction Fuzzy Hash: EE01F531F1AA4282EA50AB11E4601A86752EF45BC0F445032EE8EA774BCFAEE201C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$X_free
                                            • String ID: ..\s\ssl\statem\statem_dtls.c
                                            • API String ID: 306345296-3140652063
                                            • Opcode ID: ddd1d655efd517bf278021314f564e345f499b3705739dc7927a7ece4a56c458
                                            • Instruction ID: 16d4d1deacb6e3e2533bec8ef90245e7903a6e9a46629a3b6d55ff8466102940
                                            • Opcode Fuzzy Hash: ddd1d655efd517bf278021314f564e345f499b3705739dc7927a7ece4a56c458
                                            • Instruction Fuzzy Hash: 5CF03721F0A70685EE60AF65C4727B81723AF84B88F001031E90DAA797DEAFE9518748
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: H_retrieve$D_unlockH_deleteH_insert
                                            • String ID:
                                            • API String ID: 4154705611-0
                                            • Opcode ID: ef00bc662ad6cce81866e89ec6202eb39af8bec5e5caa04e9d4798c404c00d17
                                            • Instruction ID: 346a0cc290711719d5b43fb9e338eae7570178a34290486b3e9e47009334285e
                                            • Opcode Fuzzy Hash: ef00bc662ad6cce81866e89ec6202eb39af8bec5e5caa04e9d4798c404c00d17
                                            • Instruction Fuzzy Hash: 3F51A83270A7C241EB699F1195657B97262EF88BC0F045031EE0DA7797DFBEE4608744
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_read_lockD_unlockH_retrievememcpy
                                            • String ID:
                                            • API String ID: 2272600717-0
                                            • Opcode ID: acef7fdb32935ee9e8aaafb947195d1895c2ee5faa9f76884614c5a2f208f76e
                                            • Instruction ID: 0eeb8aee90d5d712b42cce1e187032105cc7ae0ff638b8b1e5bd445a28150023
                                            • Opcode Fuzzy Hash: acef7fdb32935ee9e8aaafb947195d1895c2ee5faa9f76884614c5a2f208f76e
                                            • Instruction Fuzzy Hash: 6B31E832B0A68196EAA59F15D4613B973A1FB88B84F045031EE0D97353EF7EE465CB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_malloc$O_free
                                            • String ID: ..\s\ssl\record\ssl3_buffer.c
                                            • API String ID: 2640950527-837614940
                                            • Opcode ID: 5d6f95ccacfe45074b3a6827aea4c6884d23f0c9dfbb37b1fe6a428fc8b8b540
                                            • Instruction ID: 1fa4f04bf4cf463fc1e459d0baab4954a8f90c37de6d22417bc64728367bf2e9
                                            • Opcode Fuzzy Hash: 5d6f95ccacfe45074b3a6827aea4c6884d23f0c9dfbb37b1fe6a428fc8b8b540
                                            • Instruction Fuzzy Hash: 9841D533B0AB8585FB649F21D9503A963E2FB44B84F044434DE4C97B8ACFBED5918708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_memdup
                                            • String ID: ..\s\ssl\statem\statem_srvr.c$D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 3962629258-1534007912
                                            • Opcode ID: 80ab33d1ed7fdfbc885bfd1539872b7148a4a53948f03765f5d25412706f3b7d
                                            • Instruction ID: c55332dad7c753782c7f0370e08206eb6efa72a5d57c88cf42ea0ffba1f7f80a
                                            • Opcode Fuzzy Hash: 80ab33d1ed7fdfbc885bfd1539872b7148a4a53948f03765f5d25412706f3b7d
                                            • Instruction Fuzzy Hash: 5741E232B1ABC186E7018F11F4502A9B3A5FB84794F084235EE8D67B5ADFBDD1918704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_memdup
                                            • String ID: ..\s\ssl\statem\statem_srvr.c$D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 3962629258-1534007912
                                            • Opcode ID: 407877f993f5957567c7eff96717ca41fb7b45d1e2b29fb543a4a146f498fde5
                                            • Instruction ID: 99693c0ff93f9f901559e5de856674ca180d24a81d15d2413efd7f355724a9f1
                                            • Opcode Fuzzy Hash: 407877f993f5957567c7eff96717ca41fb7b45d1e2b29fb543a4a146f498fde5
                                            • Instruction Fuzzy Hash: 5F41B172B1AB8186E740DF21F8102B9B3A2FB88784F044235EE8D97B56EF7DD1908704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: M_growO_zallocR_put_error
                                            • String ID: ..\s\ssl\packet.c
                                            • API String ID: 1461889847-1434567093
                                            • Opcode ID: b9ab6d090586272394edd892f959be5b6ddac8f4c20c47d27eb5d487ae62c8a4
                                            • Instruction ID: becbbae4a957562b6bc098d08f75ebeb1cc634d3fba6298f5dd20e5c820939cd
                                            • Opcode Fuzzy Hash: b9ab6d090586272394edd892f959be5b6ddac8f4c20c47d27eb5d487ae62c8a4
                                            • Instruction Fuzzy Hash: 9041C136B0AA4981DF58CF25E160368A3A1EB48BE8F144235DB6D937D9DF7DE494C304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_malloc
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 2609694610-592572767
                                            • Opcode ID: cca2de04ba0feca436f0a1cad2116421527d1edd7d11520962775640408254e4
                                            • Instruction ID: ef309fc29c2b04659d1a5bde02eb81f9d55c94e0664bbd13c0621d8653e65966
                                            • Opcode Fuzzy Hash: cca2de04ba0feca436f0a1cad2116421527d1edd7d11520962775640408254e4
                                            • Instruction Fuzzy Hash: 2231C531B0EB8186E6109F11E5107A9B792FB45B84F544134FA8DA7B4ADFBEE1A18708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_memdup
                                            • String ID: ..\s\ssl\statem\extensions_srvr.c$D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 3962629258-2178723975
                                            • Opcode ID: f4b837671daaa92fea9f211cdbc46477b9ff1f0981087d9524017b75cdb67680
                                            • Instruction ID: bdd5f5b68aed00d7c9e605b78f5c1795deb890dc0a16b45bbe9d3393b7fd985d
                                            • Opcode Fuzzy Hash: f4b837671daaa92fea9f211cdbc46477b9ff1f0981087d9524017b75cdb67680
                                            • Instruction Fuzzy Hash: 5331D331B1AB8186E7508F55E4106A9B3A5FB48B84F044131FA8CA7B46DFBDE5A1C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_strndup
                                            • String ID: ..\s\ssl\statem\extensions_srvr.c$D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 2641571835-2178723975
                                            • Opcode ID: fcee9eadaca51539a45dcda8eb672fdacef15e300b0d60578eaf6bdbd41ffe83
                                            • Instruction ID: e00eff728f943ed8efa4e95bdab5fdecc55d2295dabc1c66b800a14893e1e34b
                                            • Opcode Fuzzy Hash: fcee9eadaca51539a45dcda8eb672fdacef15e300b0d60578eaf6bdbd41ffe83
                                            • Instruction Fuzzy Hash: A7210821F09B8582EB108F51E0506ACA7A1FB44784F444130EE4C77B4AEFBDE6918B04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_strdupR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 626504629-1080266419
                                            • Opcode ID: 2e5d81b06acebd788debb9edc7641dd4caf21a2a058c8d077125d40b1fb4539e
                                            • Instruction ID: bb1694bcfac6fa3b97173ae233c83b011a55ffa7edec1563cc8b6e4cbcac7412
                                            • Opcode Fuzzy Hash: 2e5d81b06acebd788debb9edc7641dd4caf21a2a058c8d077125d40b1fb4539e
                                            • Instruction Fuzzy Hash: 82219D72F1A78185EB908B25E4643B963A2EB44780F584031EB5DD7793DFAFD9928308
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_zallocR_put_error
                                            • String ID: ..\s\ssl\packet.c$b
                                            • API String ID: 2718799170-1717309047
                                            • Opcode ID: 9e3c9b02cdd7487c8e4c923fd5af88dd4b70a938f531f83c6002c558dc9a183e
                                            • Instruction ID: 309287c732013ce1120aec81ca9a6473a4643c58cac2195320feb9403c642979
                                            • Opcode Fuzzy Hash: 9e3c9b02cdd7487c8e4c923fd5af88dd4b70a938f531f83c6002c558dc9a183e
                                            • Instruction Fuzzy Hash: BC215B32F0AB4681EB589B15E4613BD73A2EB54794F504230DA5C833D2EFBED54AC744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_mallocR_put_error
                                            • String ID: ..\s\ssl\record\rec_layer_d1.c
                                            • API String ID: 2513334388-1306860146
                                            • Opcode ID: 38f68014c77433bbac02038e11e1501a15db1aa3c0bb54ab6977a84acc10ae29
                                            • Instruction ID: 59245fb4ad2a2d95d71cbc43287074f9266869582b21aec594fa324e9345eeab
                                            • Opcode Fuzzy Hash: 38f68014c77433bbac02038e11e1501a15db1aa3c0bb54ab6977a84acc10ae29
                                            • Instruction Fuzzy Hash: 70218321B0A64685EB58EB25E4613AD73A2FF44748F440435EA4C97797EFBFE450C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_mallocmemcpy
                                            • String ID: ..\s\ssl\statem\statem_lib.c$J
                                            • API String ID: 1834057931-671735911
                                            • Opcode ID: 37713a3698048384b62e0bcc14911b4e64fa5199b032d8d9ccdff18af6216127
                                            • Instruction ID: 26b15cbf154e4483138af277a602242134de993a889096a416731b05ce2ea3b4
                                            • Opcode Fuzzy Hash: 37713a3698048384b62e0bcc14911b4e64fa5199b032d8d9ccdff18af6216127
                                            • Instruction Fuzzy Hash: 4C21B322B09B8192E610CF21E5112A9B721FB98BC4F459231EF8C53717DF79E2D5C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_zallocR_put_error
                                            • String ID: ..\s\ssl\packet.c$b
                                            • API String ID: 2718799170-1717309047
                                            • Opcode ID: 6ae20484bfb20e4ee5ab68dca70402d998c57f2a8e63ae3c30c55c3204c57f2d
                                            • Instruction ID: 0bd4a9e8ec537cca6d581e0a506dd42f1797630434a94f5dbc24440194c73831
                                            • Opcode Fuzzy Hash: 6ae20484bfb20e4ee5ab68dca70402d998c57f2a8e63ae3c30c55c3204c57f2d
                                            • Instruction Fuzzy Hash: 1201D232B0AB4182E7148F19E0501A873A2FB44768F644235EBAC877D6EF7ED966C704
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_unlockD_write_lockH_deleteH_retrieve
                                            • String ID:
                                            • API String ID: 3040165603-0
                                            • Opcode ID: c3cdafdaa93c574d323f8a73eaae8b815257cf03d91e29236b27dd5491d69592
                                            • Instruction ID: 64ea4995b939fec5db0e12a7d5aecdb43f34cec5e8ba77eb6c0b12b68ad914bb
                                            • Opcode Fuzzy Hash: c3cdafdaa93c574d323f8a73eaae8b815257cf03d91e29236b27dd5491d69592
                                            • Instruction Fuzzy Hash: 3B11B76170A7C186EAA4DF56E060269A391EF88BC0F084035FF4D9B797DF6DE4514704
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_read_lockD_unlockH_retrievememcpy
                                            • String ID:
                                            • API String ID: 2272600717-0
                                            • Opcode ID: 1844d258c4c38858c0470adf3cf7b6aea6062234b99ea9a8e60a34ada7e94daa
                                            • Instruction ID: 02406762eaa6b3fc4648e0c0807a13a8c672630c0e341877d2964f77b458c97d
                                            • Opcode Fuzzy Hash: 1844d258c4c38858c0470adf3cf7b6aea6062234b99ea9a8e60a34ada7e94daa
                                            • Instruction Fuzzy Hash: 6711E522B0DB8586EBF4DB25E4A53AC6361FB88780F400131DA4DC7712DE2DE0A18B04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_mallocmemcpy
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 1834057931-592572767
                                            • Opcode ID: 0d09c9596a59387e5bb8f6d64925e1cbc2c8b3712f0a1e274c0006f8724a75c5
                                            • Instruction ID: 2b2970d87977135bd359354adcb95efa0b1daf8e4229bf55c484a729a9d74c8e
                                            • Opcode Fuzzy Hash: 0d09c9596a59387e5bb8f6d64925e1cbc2c8b3712f0a1e274c0006f8724a75c5
                                            • Instruction Fuzzy Hash: FB417F22B0E64581FB648F15D4643B977A2FB44F80F088035DA4CA77A6CFBEE861C744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_malloc
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 2609694610-592572767
                                            • Opcode ID: d537f46a34cc54c0946058947e7f47ea5ad5f8a6d1efa7543ff9fbe6ea632e63
                                            • Instruction ID: 5055f6d1371e7ccc262501c15d5ee3c80846b370fbc18b88828eb2b6090e9f1c
                                            • Opcode Fuzzy Hash: d537f46a34cc54c0946058947e7f47ea5ad5f8a6d1efa7543ff9fbe6ea632e63
                                            • Instruction Fuzzy Hash: 9B41E621B0AB8181E764DF11D41036E6796FB84BC4F184435EE8CA7B9ADFBEE551C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_zalloc
                                            • String ID: ..\s\ssl\d1_lib.c
                                            • API String ID: 1208671065-490761327
                                            • Opcode ID: 28f9119c5caf164465fd74d6e729c258f395a4d0896097b6db490913d52f5645
                                            • Instruction ID: 74e2318636067667d4d7a5c53c8212c73ca048533929464663e8709599a56a80
                                            • Opcode Fuzzy Hash: 28f9119c5caf164465fd74d6e729c258f395a4d0896097b6db490913d52f5645
                                            • Instruction Fuzzy Hash: 5F319A61B1A78681FA4CAB6195A13F96391EF49784F041030EE4ED7787DF7DE4A1C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 2581946324-1507966698
                                            • Opcode ID: 272e2eb847bb3fbff2dacf6a3a114d58e5e37a58b7e71007d02a7663ed5d6c58
                                            • Instruction ID: 4bf3f10e6d737ca82408b0aac85767af29aa6ccbd930dfb664ae5cebc95720cf
                                            • Opcode Fuzzy Hash: 272e2eb847bb3fbff2dacf6a3a114d58e5e37a58b7e71007d02a7663ed5d6c58
                                            • Instruction Fuzzy Hash: 8531D272B1D78146E7A09B51E0102AAB792FBC57C4F040134EACDA7B4ADFBDD1508B08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_memdupR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1048774365-1080266419
                                            • Opcode ID: 5afba650ea48e7fee841b0f0cba109d8cc061778d93cb4bed126621b1c6fba9f
                                            • Instruction ID: d26f8c5de688bc008980d0bff3e49d81e1f1bb7cd19a0725425d2ffe63208a4e
                                            • Opcode Fuzzy Hash: 5afba650ea48e7fee841b0f0cba109d8cc061778d93cb4bed126621b1c6fba9f
                                            • Instruction Fuzzy Hash: 0111C935F0A39283EB248716E420B79B752EF92746F540076CA4D67B46DE6FED028704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_malloc
                                            • String ID: ..\s\ssl\record\ssl3_buffer.c$F
                                            • API String ID: 1457121658-4203526889
                                            • Opcode ID: 760e48131aea6df6ca7d3e55eb0f46afc480d02c60cf043e8074869e34ff349e
                                            • Instruction ID: 9ef963668ba4f410fcc6d62ac7dfae44b9f2cabc14f6c56b0f5d71af89ebc532
                                            • Opcode Fuzzy Hash: 760e48131aea6df6ca7d3e55eb0f46afc480d02c60cf043e8074869e34ff349e
                                            • Instruction Fuzzy Hash: 4C11B432B0AA8181E7109B15F50039967A1F788BC4F084135EF4CA3B8ACF7ED591CB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_free
                                            • String ID: ..\s\ssl\statem\statem_clnt.c$@
                                            • API String ID: 2011826501-1207107681
                                            • Opcode ID: 85200123b01b05cc52c48a53fd785423268fe6e58dc3e10c0d57c1a64805e6a5
                                            • Instruction ID: 78be0db207773e9bba90167f43b71676db94f50be1d8e58cdd541e5c444e98db
                                            • Opcode Fuzzy Hash: 85200123b01b05cc52c48a53fd785423268fe6e58dc3e10c0d57c1a64805e6a5
                                            • Instruction Fuzzy Hash: 59216D31B0978285EB608F12D5557B96766FB85FD4F094031CE4CABB9ACF7EE0458308
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_strdup
                                            • String ID: ..\s\ssl\s3_lib.c
                                            • API String ID: 2148955802-4238427508
                                            • Opcode ID: 4fcc587332fcd85da71337ecb7517b00310b11705aad0983c4cd1313d0b66de5
                                            • Instruction ID: a5bad4ac17a6f7dfc7bed18c1841d162fcdf86ea1f6840c9a9d798a49f9710a2
                                            • Opcode Fuzzy Hash: 4fcc587332fcd85da71337ecb7517b00310b11705aad0983c4cd1313d0b66de5
                                            • Instruction Fuzzy Hash: 8D11C425F0E69646F7A1AB49E0203B86752BB81B44F440035DA8C5B786CFEFE6428708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_memdup
                                            • String ID: ..\s\ssl\s3_lib.c
                                            • API String ID: 3962629258-4238427508
                                            • Opcode ID: 3108a5092fda8c8bee01f408271f6aa1c4df9363ff0874777839b1e8f9030971
                                            • Instruction ID: 72a7da4388c3e9e6f28171b4ce5feca6309c1c98f1a22569e87f2e54f2a065b8
                                            • Opcode Fuzzy Hash: 3108a5092fda8c8bee01f408271f6aa1c4df9363ff0874777839b1e8f9030971
                                            • Instruction Fuzzy Hash: 47019B31B0AB8152EA959B15E4513D9A2D1FF48BC0F484035EF5CD7746DF7DD5618304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_memdup
                                            • String ID: ..\s\ssl\ssl_sess.c
                                            • API String ID: 3962629258-2868363209
                                            • Opcode ID: 2dc206ac1897eba174e4d68926f44c31a7b3390a93b44d875a904ad68d885eb1
                                            • Instruction ID: 992f6f9725c6900462734ba65609fdc3984ddb858651850a6a4709d2b91703d1
                                            • Opcode Fuzzy Hash: 2dc206ac1897eba174e4d68926f44c31a7b3390a93b44d875a904ad68d885eb1
                                            • Instruction Fuzzy Hash: E601C431B0AFC141EB919F15B8552A86391EF84BC4F484031EE4DA7B8AEF7DD4928308
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\statem\extensions_cust.c
                                            • API String ID: 2581946324-3973221358
                                            • Opcode ID: 3cf5db9897d16314f6c406a7537cbdf5f713d31316b71214a26921031eca8072
                                            • Instruction ID: 7341e7dfcd155ade923d2a0f23499b2d856e7a0f077edd3bf3fb584c191ea36f
                                            • Opcode Fuzzy Hash: 3cf5db9897d16314f6c406a7537cbdf5f713d31316b71214a26921031eca8072
                                            • Instruction Fuzzy Hash: 45018031F1BA0285EB109F15E4611A9A762FF44BC4F044036EA4DA779ADFBED1508744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_memdup
                                            • String ID: D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 3962629258-373350680
                                            • Opcode ID: 6eceafe0f9ac89be950eaf40397fa8a42b0b463cabdcf8e0bbc67e2867511beb
                                            • Instruction ID: 079e7cdd18be8293abf6b53028a5cfe4fe523446486892e19d352171c2999507
                                            • Opcode Fuzzy Hash: 6eceafe0f9ac89be950eaf40397fa8a42b0b463cabdcf8e0bbc67e2867511beb
                                            • Instruction Fuzzy Hash: 99012C72B06F9281EB508F12E89065977A5EB58BC0F089431EE8CA7B4ADF7DD5A18704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_memdup
                                            • String ID: D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 3962629258-373350680
                                            • Opcode ID: ef56933983db122366dd84d6e4ddb53d1b3936ce8cd6473e3eb14fac8a8ae14d
                                            • Instruction ID: 5c6632a6120ae4c76037005ff99724c3ddbc2a5033e7778f8040efcef790d614
                                            • Opcode Fuzzy Hash: ef56933983db122366dd84d6e4ddb53d1b3936ce8cd6473e3eb14fac8a8ae14d
                                            • Instruction Fuzzy Hash: 7D012C32707F9281EB508F12E89065977A5EB58BC0F089031EE8C97B4ADE7DD5A18704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_zallocR_put_error
                                            • String ID: ..\s\ssl\packet.c
                                            • API String ID: 2718799170-1434567093
                                            • Opcode ID: 59326ab27369182db2ce9892aaeb255d9a41e7f068212e692eec0036cf6bba17
                                            • Instruction ID: 9558abdb5f73cf4e515c7159bf6950b5a64367e40124d6125202162a427734b2
                                            • Opcode Fuzzy Hash: 59326ab27369182db2ce9892aaeb255d9a41e7f068212e692eec0036cf6bba17
                                            • Instruction Fuzzy Hash: 4001A276B07B0585EB14CF14E4653A873A1EB54B08F604034DA0C87792FFBED996C744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_strdup
                                            • String ID: ..\s\ssl\ssl_sess.c
                                            • API String ID: 2148955802-2868363209
                                            • Opcode ID: dc3d2fc0f14784eb2e146324ee3a97f3f81b5d0262eaa536f718f385f35f1364
                                            • Instruction ID: d07af37de5589e9d4146883df358d0308e7f183a4354fc5c9cbfdacdb409059a
                                            • Opcode Fuzzy Hash: dc3d2fc0f14784eb2e146324ee3a97f3f81b5d0262eaa536f718f385f35f1364
                                            • Instruction Fuzzy Hash: 80F02821B09B4181EB94CF16F9952A96393DF88BC0F088130EE4CC3B9BEE3DD2924304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_strndup
                                            • String ID: D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 2641571835-373350680
                                            • Opcode ID: 549cacb4790ac9b14b9aaa29e9ffd38caa9ecff224222ef14d100b17865d5f94
                                            • Instruction ID: 58db2b412c3e6982780847532ec542eedd15293520e8381b37124f0fb5d0c0da
                                            • Opcode Fuzzy Hash: 549cacb4790ac9b14b9aaa29e9ffd38caa9ecff224222ef14d100b17865d5f94
                                            • Instruction Fuzzy Hash: B3F0EC31B06E8681EB049B55E8A16EC6362DF4CBC8F048035EE0CD7757CE3DC5518304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_strndup
                                            • String ID: D:\a\1\s\ssl\packet_local.h
                                            • API String ID: 2641571835-373350680
                                            • Opcode ID: ce9a0d4aaae99bef2d8b22650f0948099d274d96d90a6c24dfb202b843b64582
                                            • Instruction ID: 58db2b412c3e6982780847532ec542eedd15293520e8381b37124f0fb5d0c0da
                                            • Opcode Fuzzy Hash: ce9a0d4aaae99bef2d8b22650f0948099d274d96d90a6c24dfb202b843b64582
                                            • Instruction Fuzzy Hash: B3F0EC31B06E8681EB049B55E8A16EC6362DF4CBC8F048035EE0CD7757CE3DC5518304
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_unlockD_write_lockH_set_down_load
                                            • String ID:
                                            • API String ID: 3243170206-0
                                            • Opcode ID: 364387872cffc2959901a71411da3d0a2019158a9bb87262f2a5101fd8f4fe06
                                            • Instruction ID: 96237bcaf643a7d6f490415594257fabfa9c0a0a7d05d682675f8c20b236c555
                                            • Opcode Fuzzy Hash: 364387872cffc2959901a71411da3d0a2019158a9bb87262f2a5101fd8f4fe06
                                            • Instruction Fuzzy Hash: E9017C62B09A8182DA60EB62E8A10686362FBC8794F440171FA4DD7B57DFBDD5628708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\record\rec_layer_d1.c
                                            • API String ID: 2581946324-1306860146
                                            • Opcode ID: 5169c80baa392f2f343d14022db2a2c0489a76904eba205426d6dfcd2018c174
                                            • Instruction ID: 03d201dd1798468cbf43707cabce82465d2dd58448abb6c0fd88d1623e87400d
                                            • Opcode Fuzzy Hash: 5169c80baa392f2f343d14022db2a2c0489a76904eba205426d6dfcd2018c174
                                            • Instruction Fuzzy Hash: 17517022B4A74681EA189F66D4602BC73A2EF44FC4F184132EE4DD7787DFAEE4518318
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_malloc
                                            • String ID: ..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 1457121658-1507966698
                                            • Opcode ID: 2212a3221ecae7a569e586a867ecb0d05ef10e2919d33d8f4ee345b33c9b8996
                                            • Instruction ID: 026a51f802447dae162da08f29fa669faf128fb55932532e67a0e8f4d1bc66c6
                                            • Opcode Fuzzy Hash: 2212a3221ecae7a569e586a867ecb0d05ef10e2919d33d8f4ee345b33c9b8996
                                            • Instruction Fuzzy Hash: 4031233271AB8086E360DF11E4102ADF7A2EB85BD4F444131DA8DA7B96DFBEE151C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 2581946324-592572767
                                            • Opcode ID: 92231f2c3840198930cef2b353f7c7182c4a0220501f44b0c28d4191049ca0ca
                                            • Instruction ID: b4f09bd787052eeb37a467378ddd07f8cd0a5074a2f59a6c2366c03b0a390345
                                            • Opcode Fuzzy Hash: 92231f2c3840198930cef2b353f7c7182c4a0220501f44b0c28d4191049ca0ca
                                            • Instruction Fuzzy Hash: 6E21E522B0D65142E7109F12E5143AE6762FB45BC0F040031DE5CABB8BCFBEE8518B58
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_strdup
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 1296259186-592572767
                                            • Opcode ID: 07947fcce73defaefd8bda5089e50f55aa59f62f3488ed1f5ae55716c646f564
                                            • Instruction ID: 9d5233ae546e3ba50a86623650b51f155816b989b49875fb8c21f57a5e14e599
                                            • Opcode Fuzzy Hash: 07947fcce73defaefd8bda5089e50f55aa59f62f3488ed1f5ae55716c646f564
                                            • Instruction Fuzzy Hash: 98215331B0DA4185E7608F00E8547BE67A1E744B88F544432DA8CAB79ACFBED9D5CB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\record\ssl3_buffer.c
                                            • API String ID: 2581946324-837614940
                                            • Opcode ID: adfe7c6bc8e8fc6d31d3e75e036973f93e3b6d4ea89d61374b896b26795afd0e
                                            • Instruction ID: 894fb2936ffb88c87c837eca18ec7dbd0c8cffd25eeb1d8ea8cb2b7da2b16031
                                            • Opcode Fuzzy Hash: adfe7c6bc8e8fc6d31d3e75e036973f93e3b6d4ea89d61374b896b26795afd0e
                                            • Instruction Fuzzy Hash: AF01CC3371AB92C1E6509B04E1502DC33A5FB48B84F580031EB8CABB56CF7ED0A28740
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\packet.c
                                            • API String ID: 2581946324-1434567093
                                            • Opcode ID: da0b1486a29e875446c9408f5f46ebbd01b5aef1fcd694bc84046bbc94b541a5
                                            • Instruction ID: feb29c8b2f661a1121ae6ac212bd133f9d8f71f0262dfc5f70f106204eba20b0
                                            • Opcode Fuzzy Hash: da0b1486a29e875446c9408f5f46ebbd01b5aef1fcd694bc84046bbc94b541a5
                                            • Instruction Fuzzy Hash: DAF0F6A1F1A60A81EB645B15806037863A2EF44790F041030E94CD7387DFBED8D1C758
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\record\ssl3_record.c
                                            • API String ID: 2581946324-2721125279
                                            • Opcode ID: 309ac8ddcce84b15061a267a37eda474b70396621fe7370d901befdeee5a4623
                                            • Instruction ID: ab15ff84f96ee494b1c0302b076eff38ac90ea79a5e0204e2aed4a348731db21
                                            • Opcode Fuzzy Hash: 309ac8ddcce84b15061a267a37eda474b70396621fe7370d901befdeee5a4623
                                            • Instruction Fuzzy Hash: 91F0BE36F2AA5180EB945B10E4903A87766EF88BD0F585031FE4DE3B4ADE7EC090C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\statem\extensions.c
                                            • API String ID: 2581946324-1165805907
                                            • Opcode ID: c14ec2ece7a0bf9546d8abbf34e5a2bf96408437d78f0f9b60bdd7d695f7ad69
                                            • Instruction ID: 9d1d8ca33bb0490b54c35e5e29e5018557f3e0064c9a86eaaac648d8b1e7ac54
                                            • Opcode Fuzzy Hash: c14ec2ece7a0bf9546d8abbf34e5a2bf96408437d78f0f9b60bdd7d695f7ad69
                                            • Instruction Fuzzy Hash: 57E04FA2B076018AE750AB58D0A93E42652DB44758F580434E90CDB392DFBF9592C754
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\s3_lib.c
                                            • API String ID: 2581946324-4238427508
                                            • Opcode ID: 6dd7d71263fe0d195323df282845c5af553974c56a1c9e52e62c151ae13b08e9
                                            • Instruction ID: 170a8a88e2b80d84c239a97cc7c97c28394d01f66826d0ccf60562ce053fb76e
                                            • Opcode Fuzzy Hash: 6dd7d71263fe0d195323df282845c5af553974c56a1c9e52e62c151ae13b08e9
                                            • Instruction Fuzzy Hash: 71E08622B09A51C5F700AF25F0102986353FBC0B54F080032DE0C57796CEBFD092C314
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\t1_lib.c
                                            • API String ID: 2581946324-1643863364
                                            • Opcode ID: 622bce27a1d0a96630dbfaac7ead27c4b7118659e75fb43a875b1e08f896f7c3
                                            • Instruction ID: adcd38e8bb1c162cf291692c1512f3dd30e5d7ffa80cbe3559777cf665b9bcc0
                                            • Opcode Fuzzy Hash: 622bce27a1d0a96630dbfaac7ead27c4b7118659e75fb43a875b1e08f896f7c3
                                            • Instruction Fuzzy Hash: 24D01711F0B50685EA546A9284726B827129F48B44F144030ED1DE77939C8EE5569718
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free
                                            • String ID: ..\s\ssl\statem\extensions.c
                                            • API String ID: 2581946324-1165805907
                                            • Opcode ID: 891db287cd659d7b8d35944e732a7309ebfc8684a9206ef12554e0065cf9a329
                                            • Instruction ID: cabac089cb7250b494cd220d51b783a317554fd74a4c12d13ccdc99045c8d778
                                            • Opcode Fuzzy Hash: 891db287cd659d7b8d35944e732a7309ebfc8684a9206ef12554e0065cf9a329
                                            • Instruction Fuzzy Hash: 0ED0A796F0AA0145F7506B55D4653D41321EF08748F481032ED0CEB7C3DE9FE1928718
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_unlockD_write_lock
                                            • String ID:
                                            • API String ID: 1724170673-0
                                            • Opcode ID: 2efe79bff30d255ef0ab69b4ea0d008c3b9a7bc6aea054b00a91d2cdc12de54a
                                            • Instruction ID: 31f1542d5258e9f692b4b96b73aa4b89dec7f1c9c900188831917f7be5cb645e
                                            • Opcode Fuzzy Hash: 2efe79bff30d255ef0ab69b4ea0d008c3b9a7bc6aea054b00a91d2cdc12de54a
                                            • Instruction Fuzzy Hash: 48E02623B0EA4181D784A751F9902F85321EF48790F581031FE1DC7383ED79D8E20304
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_memcmp
                                            • String ID:
                                            • API String ID: 2788248766-0
                                            • Opcode ID: 6a6d465780acf7ed9e56836580813f18a6b0f1139c5b2302c9c2a56e0bb2ae19
                                            • Instruction ID: 8c60755c005384f8882e2d159c74ba201c83c8125e48567067d3a741e721ff3d
                                            • Opcode Fuzzy Hash: 6a6d465780acf7ed9e56836580813f18a6b0f1139c5b2302c9c2a56e0bb2ae19
                                            • Instruction Fuzzy Hash: 4BD0A916F0B50282F688B23A89A60A902C19B80380F948034E50DD2783CC4EC8E64708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_memcmp
                                            • String ID:
                                            • API String ID: 2788248766-0
                                            • Opcode ID: 6a6d465780acf7ed9e56836580813f18a6b0f1139c5b2302c9c2a56e0bb2ae19
                                            • Instruction ID: ef0d690cb60172ac584826e8aed4495361274a7894130ebfac363eec3b5a7664
                                            • Opcode Fuzzy Hash: 6a6d465780acf7ed9e56836580813f18a6b0f1139c5b2302c9c2a56e0bb2ae19
                                            • Instruction Fuzzy Hash: 3CD0A916F0760282E688B33E89A20A902D09B80380F948034E60ED2783CD5EC8E64B05
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_run_once
                                            • String ID:
                                            • API String ID: 1403826838-0
                                            • Opcode ID: d055155e7dfa394d9151ded48a12c15ff788ed91f46543e9f8dab3fed7f81b86
                                            • Instruction ID: b00c1f66013f854b15d7d442ff2f1f47fc365db447e3b465456147a07521c26d
                                            • Opcode Fuzzy Hash: d055155e7dfa394d9151ded48a12c15ff788ed91f46543e9f8dab3fed7f81b86
                                            • Instruction Fuzzy Hash: 29D05E24F4AA0392F648A32CCC721B162526F41300F404035E40DE3753DD9DE9568718
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_run_once
                                            • String ID:
                                            • API String ID: 1403826838-0
                                            • Opcode ID: 50386b0b5eefdba10866bde5667da4eefc104fd624e264bf7722bf74b99ec935
                                            • Instruction ID: 05c7fe45eaa980a7559cbac7718c563752e18acd8ef335644c388e949da09111
                                            • Opcode Fuzzy Hash: 50386b0b5eefdba10866bde5667da4eefc104fd624e264bf7722bf74b99ec935
                                            • Instruction Fuzzy Hash: 93D09254F4BA4691E910AB5DD8A11A45312AF41304F804031E50CE63A7DD9EE566835C

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: P_add_cipher$P_add_digest$E_addE_finishY_asn1_find_strY_asn1_get0_info$D_run_onceJ_nid2snP_aes_256_cbcP_get_digestbynameP_md5P_sha1P_sha256
                                            • String ID: MD5$RSA-SHA1$RSA-SHA1-2$SHA1$ssl3-md5$ssl3-sha1
                                            • API String ID: 802802306-3803824401
                                            • Opcode ID: 58cda8fca9c60835c32c60c2a7d44b18d34cbf4c616ad85a3a02e40197818324
                                            • Instruction ID: 1bc8a8cb1f6b4ba20c6ac8a2f59415520fc472f27dd93d494d86b7fe5db53a85
                                            • Opcode Fuzzy Hash: 58cda8fca9c60835c32c60c2a7d44b18d34cbf4c616ad85a3a02e40197818324
                                            • Instruction Fuzzy Hash: 1741ED90F0B24781E9A4F7E2643A5F812435F81760F480835F90EF6397EDAEF4848769
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X509_$L_sk_num$R_put_error$L_sk_value$E_add_certX509_free$E_freeE_newL_sk_popL_sk_pop_freeL_sk_shiftR_add_error_dataR_clear_errorX509_get_extension_flagsX_freeX_get1_chainX_new
                                            • String ID: ..\s\ssl\ssl_cert.c$Verify error:
                                            • API String ID: 2601141546-2787608381
                                            • Opcode ID: 5049874d2361cbabf52a9f06f8f08ec0b543a9ec8c0c08948edb80b58f74209a
                                            • Instruction ID: dc532b66f693585c0b6ed5f648ab9c5045b66525e9477021d3d8cf7f15895083
                                            • Opcode Fuzzy Hash: 5049874d2361cbabf52a9f06f8f08ec0b543a9ec8c0c08948edb80b58f74209a
                                            • Instruction Fuzzy Hash: B5919421B0B64787FA64EA2294356BD6293AF44B84F444435ED4DE7783DFBEE5808308
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$L_sk_set_cmp_funcX509_$E_freeM_read_bio_O_freeX509X509_free$E_dupErrorL_sk_findL_sk_pushLastO_ctrlO_newO_s_fileO_snprintfR_add_error_dataR_clear_errorR_endR_readX509_get_subject_name_errno
                                            • String ID: %s/%s$..\s\ssl\ssl_cert.c$OPENSSL_DIR_read(&ctx, '
                                            • API String ID: 1034648778-4291904164
                                            • Opcode ID: 627fe3b24fabd2d2a33f12e6dd11bf5debad2629e1e43702dac1066637e908aa
                                            • Instruction ID: 4a3e120479f20f15f306189277191a09f6e3b357fc482d5338f0aebb9b2ad607
                                            • Opcode Fuzzy Hash: 627fe3b24fabd2d2a33f12e6dd11bf5debad2629e1e43702dac1066637e908aa
                                            • Instruction Fuzzy Hash: BF718561B0E78282FB709B51E4317B96352AF85784F440035EA4DA7B97DFBEE481870C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Digest$Update$Final_exX_copy_exX_freememcpy$D_sizeR_flagsX_cipherX_mdX_new
                                            • String ID: 666666666666666666666666666666666666666666666666\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
                                            • API String ID: 3621087735-2009547811
                                            • Opcode ID: e37860b31a779a327cb44d8bf5cfb0dc8edfb86ecc58f51a149e37845ba4bda2
                                            • Instruction ID: bd4dab9a165e84ab7236429c3f6318c53262ddf8366690ec9496056f436c133d
                                            • Opcode Fuzzy Hash: e37860b31a779a327cb44d8bf5cfb0dc8edfb86ecc58f51a149e37845ba4bda2
                                            • Instruction Fuzzy Hash: 9F81DA62B0AB8740FA1CDB16A8356B9A753EF45BC0F040036ED4DE7797DEAED4448708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X509_$E_freeH_freeM_read_bio_O_freeX509X509_free$E_dupH_retrieveL_sk_new_nullL_sk_pop_freeL_sk_pushO_ctrlO_newO_s_fileR_clear_errorR_put_errorX509_get_subject_name
                                            • String ID: ..\s\ssl\ssl_cert.c
                                            • API String ID: 751231659-349359282
                                            • Opcode ID: d2b0f7c6c1076af27aaef5a91b42b6acc0624129fed82b24db3b390386e8e288
                                            • Instruction ID: 4dac424730940edbface48c299210c7ebd10c2bfd37a1310a9f9cc44a01d3fe9
                                            • Opcode Fuzzy Hash: d2b0f7c6c1076af27aaef5a91b42b6acc0624129fed82b24db3b390386e8e288
                                            • Instruction Fuzzy Hash: 27419061B0F74246FE64AB2294316B957939F85BC4F084034ED0DEBB97DEEEE0818308
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X_ctrl$X_free$D_sizeR_put_errorX_new_idY_derive_init
                                            • String ID: ..\s\ssl\tls13_enc.c$U$W$tls13
                                            • API String ID: 2176224248-2595563013
                                            • Opcode ID: 7025e5d67e21c680d55085412324220ae3acebaa8e34da1c22efe020185f10cc
                                            • Instruction ID: 529bccd473433e868650263d2d9fc39827ff2bd213b131ae569273ad3e952364
                                            • Opcode Fuzzy Hash: 7025e5d67e21c680d55085412324220ae3acebaa8e34da1c22efe020185f10cc
                                            • Instruction Fuzzy Hash: 8591B431B0D68642FB74AA11E4207BA6752EB84784F440135EE4DEB797DFBED941CB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$O_ctrlO_freeO_newO_s_fileR_clear_errorX509_free
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 2163941219-2723262194
                                            • Opcode ID: b84c602e5be984a9436d7ecfe5f9ecb1d86c3c77b663728f0f986a5d295781ac
                                            • Instruction ID: 24e0395bd4ba9ce958cf75e70a6329fd26f75fc122e71e1b575b436947204859
                                            • Opcode Fuzzy Hash: b84c602e5be984a9436d7ecfe5f9ecb1d86c3c77b663728f0f986a5d295781ac
                                            • Instruction Fuzzy Hash: B251B611B0EAC385FA24AF6294316B96292AF45B84F044035FD4DE779BDFBFE4548708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: DigestX_mdX_new$D_sizeD_typeFinal_exO_ctrlO_freeUpdateX_copy_exX_ctrlX_free
                                            • String ID: ..\s\ssl\s3_enc.c
                                            • API String ID: 485953282-1839494539
                                            • Opcode ID: ef17e9a45c90a4201180d711f444119ed43c2813af601f3ad1389d32d129b891
                                            • Instruction ID: 290e80e2e79dc5e14e8d9c6876c3035f4bf27be010a7ccb317bf28711e07b56b
                                            • Opcode Fuzzy Hash: ef17e9a45c90a4201180d711f444119ed43c2813af601f3ad1389d32d129b891
                                            • Instruction Fuzzy Hash: 4E61B532B0A68245EB60DB12D5623B96792EF85BC4F044035DE4EEB797DFBED4418708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$R_add_error_data$conf_ssl_get_cmdconf_ssl_name_find
                                            • String ID: )$, arg=$, cmd=$..\s\ssl\ssl_mcnf.c$name=$section=$system_default
                                            • API String ID: 1136227658-3150877160
                                            • Opcode ID: de54f06d0a5ad61313ac3c5f2a910e846887ce29ff7eae0f94fcbb296ca8278f
                                            • Instruction ID: 10a2f3695caa8abc621f4d2f155831ada7d7292db985dfa02a2d794f8ef97e92
                                            • Opcode Fuzzy Hash: de54f06d0a5ad61313ac3c5f2a910e846887ce29ff7eae0f94fcbb296ca8278f
                                            • Instruction Fuzzy Hash: 7951B722B0E78686EB20AB55E4202E97392FB85784F444036EE4DD7B87DFBED941C705
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\s3_enc.c
                                            • API String ID: 0-1839494539
                                            • Opcode ID: 5d7a45a94e98385d8f0f84cc3fc7ee52ffaaa0ab4984e631c558149010dd3fb3
                                            • Instruction ID: 4d197e0324651efe836ac3dcb70f9e088bd635d43acb845413e5edfee1bf4ff3
                                            • Opcode Fuzzy Hash: 5d7a45a94e98385d8f0f84cc3fc7ee52ffaaa0ab4984e631c558149010dd3fb3
                                            • Instruction Fuzzy Hash: 87819131B0AA4282EA60DB11E4263BD6392FB40BC4F440535DE4EAB787DFBEE545C348
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$L_sk_dupL_sk_freeL_sk_value$L_sk_insertL_sk_set_cmp_funcL_sk_sort
                                            • String ID:
                                            • API String ID: 3373104257-0
                                            • Opcode ID: 7e81393dbd7bc1aec2206ad93fd04eec181d4c00f356fb770602c10c45cf52be
                                            • Instruction ID: d64fcfd553f8f7ae260b73732db9e3ee77750e7453c9f1f2969667a5986051e4
                                            • Opcode Fuzzy Hash: 7e81393dbd7bc1aec2206ad93fd04eec181d4c00f356fb770602c10c45cf52be
                                            • Instruction Fuzzy Hash: C1215321F0B70681EA64EB16947117DA296AF88BC0F055031FD4FE7797DEBED4828308
                                            APIs
                                            • EVP_PKEY_CTX_new.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDA3492510), ref: 00007FFDA3490575
                                            • X509_get0_pubkey.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDA3492510), ref: 00007FFDA34905E6
                                            • ERR_clear_error.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDA3492510), ref: 00007FFDA34905FF
                                            • ASN1_item_d2i.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDA3492510), ref: 00007FFDA349061E
                                            • ASN1_TYPE_get.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDA3492510), ref: 00007FFDA349063B
                                            • EVP_PKEY_CTX_ctrl.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDA3492510), ref: 00007FFDA34906EE
                                            • EVP_PKEY_CTX_free.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDA3492510), ref: 00007FFDA3490744
                                            • ASN1_item_free.LIBCRYPTO-1_1(?,?,?,?,?,..\s\ssl\statem\statem_srvr.c,00007FFDA3492510), ref: 00007FFDA3490753
                                              • Part of subcall function 00007FFDA3431C08: CRYPTO_malloc.LIBCRYPTO-1_1 ref: 00007FFDA34488C9
                                              • Part of subcall function 00007FFDA3431C08: memset.VCRUNTIME140 ref: 00007FFDA34488F7
                                              • Part of subcall function 00007FFDA3431C08: memcpy.VCRUNTIME140 ref: 00007FFDA3448933
                                              • Part of subcall function 00007FFDA3431C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDA3448956
                                              • Part of subcall function 00007FFDA3431C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDA34489BD
                                              • Part of subcall function 00007FFDA3431C08: CRYPTO_clear_free.LIBCRYPTO-1_1 ref: 00007FFDA3448A38
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_free$E_getN1_item_d2iN1_item_freeO_mallocR_clear_errorX509_get0_pubkeyX_ctrlX_freeX_newmemcpymemset
                                            • String ID: $..\s\ssl\statem\statem_srvr.c$Q
                                            • API String ID: 2622237655-4085857157
                                            • Opcode ID: 29b83a6a0e9b2dcd0b987ecca7b7a48fca6c18b4ebd350d10a0bdae3980f98aa
                                            • Instruction ID: dd845b0e1bc8c4dfed58a7d88af5062bba0285a4d57663c8310fdfcbe9c2f1c3
                                            • Opcode Fuzzy Hash: 29b83a6a0e9b2dcd0b987ecca7b7a48fca6c18b4ebd350d10a0bdae3980f98aa
                                            • Instruction Fuzzy Hash: 3A61C27170AB4281EA70DB55E4203B9B792EF84B94F044035DE8D97797DFBEE5408B08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Digest$SignY_new_raw_private_key$FinalInitL_cleanseUpdateX_freeX_newY_free
                                            • String ID: ..\s\ssl\tls13_enc.c$finished
                                            • API String ID: 2202177965-3224497825
                                            • Opcode ID: ca03616b0c750a7e6b1ea2480e971be00b884d2251b7000aaaf849d8ff587b0e
                                            • Instruction ID: 141ce928ae2b5809c6f0c71dfba79f510436471ee9e800e3359195ab57718a45
                                            • Opcode Fuzzy Hash: ca03616b0c750a7e6b1ea2480e971be00b884d2251b7000aaaf849d8ff587b0e
                                            • Instruction Fuzzy Hash: E451B52170AA8286E664DB52E4213FAA352FF84BC0F444436EE4DA7B47DFBDD541C744
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_next$O_free_allO_int_ctrlO_newO_s_socketO_up_refR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 3703036260-1080266419
                                            • Opcode ID: 350f4745fa107194776e9f47efe5bc83782cd8098f8e85f8f58fc5efdbc54413
                                            • Instruction ID: 39ec47b2c62b3fc117e419e2ce2e4b6b6b4aadf13053c355789c6397985a7838
                                            • Opcode Fuzzy Hash: 350f4745fa107194776e9f47efe5bc83782cd8098f8e85f8f58fc5efdbc54413
                                            • Instruction Fuzzy Hash: 91314C21F4B71281EA65AB25D02117D63A2EF84B84F040531EE0DA7B8BDFAEE8508748
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$X509_get0_pubkey
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 2083351937-2723262194
                                            • Opcode ID: ebe6d218d256f2b93a931c41f9664656afb9b2d4bbfeeb00eff9d52bac07fb99
                                            • Instruction ID: 60c65b9164f242940a9ae4667f8b75dac0eb2262a36e164aec20352495b05991
                                            • Opcode Fuzzy Hash: ebe6d218d256f2b93a931c41f9664656afb9b2d4bbfeeb00eff9d52bac07fb99
                                            • Instruction Fuzzy Hash: 9B416022B09A8782EF14DF15E4502BDB761FB88B88F440131EA4D9375AEFBEE585C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$Y_freeY_new
                                            • String ID: ..\s\ssl\s3_lib.c$b
                                            • API String ID: 1220942454-2522393336
                                            • Opcode ID: 8a933b611ca1d037401981aeb5c2c7ac1fed2e98a26f8ebfe6c6a97711fd6726
                                            • Instruction ID: cca360ba697a26d8287d7266862140fa5af4699529cfdf3686654f420257acd9
                                            • Opcode Fuzzy Hash: 8a933b611ca1d037401981aeb5c2c7ac1fed2e98a26f8ebfe6c6a97711fd6726
                                            • Instruction Fuzzy Hash: 8521A121F0A55682F760EBA1D5207B95293AB84790F000436DD4DABBC7DFBFE5414718
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_valueX509_get0_pubkeyX509_get_signature_infoY_security_bits
                                            • String ID:
                                            • API String ID: 1174944434-0
                                            • Opcode ID: 06a7ac04a5e40e1c636a0d8f1aa0c656e7530ec4d16e834c73aa5529e2827fef
                                            • Instruction ID: c5a84a4df090e7ea5cb91e16b6fa452d7e77cb6d2c8a17968155a60fd11c381c
                                            • Opcode Fuzzy Hash: 06a7ac04a5e40e1c636a0d8f1aa0c656e7530ec4d16e834c73aa5529e2827fef
                                            • Instruction Fuzzy Hash: B551FD32F1E28645F674EA2660217BA6297BF84794F144071ED8EE7B87DFBED4404B08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X_ctrl$R_flagsX_cipher$O_test_flags
                                            • String ID: ..\s\ssl\record\rec_layer_s3.c
                                            • API String ID: 307562122-2209325370
                                            • Opcode ID: 219cee7dc8a97dc7574e9b0d5b3704cee6b6d9f571b607d943695a0c0b2f32af
                                            • Instruction ID: f1b1d4e58cb89bdde0f5ee003c18246b070abdb88983649cad0f073e28783936
                                            • Opcode Fuzzy Hash: 219cee7dc8a97dc7574e9b0d5b3704cee6b6d9f571b607d943695a0c0b2f32af
                                            • Instruction Fuzzy Hash: 2002D831B0AB8A85EB189F25D4203B937A2FB45B88F180135DE4DA779ADFBED445C704
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\statem\extensions_srvr.c
                                            • API String ID: 0-1853348325
                                            • Opcode ID: d3447623406513efbdc3eeda6ab0062c0fa57edd4533750b4de533e85138f044
                                            • Instruction ID: d0541271237ec3b1594dae6a1ac63e563ff8ba70e46e664ad397e886a087f8da
                                            • Opcode Fuzzy Hash: d3447623406513efbdc3eeda6ab0062c0fa57edd4533750b4de533e85138f044
                                            • Instruction Fuzzy Hash: 68C19F61F0A64645FB249A62D5603BD2393EF44B84F054031DE4DEBB8BEFBEE5458708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$ErrorLastM_freeM_growR_clear_error
                                            • String ID: ..\s\ssl\statem\statem.c
                                            • API String ID: 2562538362-2512360314
                                            • Opcode ID: a3e023d0b073baeba4bd492517419a31f62972f068ae63838dd34882c46fe785
                                            • Instruction ID: 83b58ce8c57615d632ee5a157b3abdbc2064aacbb80c695888ba7a8b825b9bd1
                                            • Opcode Fuzzy Hash: a3e023d0b073baeba4bd492517419a31f62972f068ae63838dd34882c46fe785
                                            • Instruction Fuzzy Hash: A2B15172F0A24286F7A49F15D4643B836A3EB41B48F144435CA08A7796DFBFE884CB09
                                            APIs
                                            • EVP_MD_size.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDA349C94F), ref: 00007FFDA349A7D1
                                            • EVP_CIPHER_flags.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDA349C94F), ref: 00007FFDA349A839
                                            • EVP_CipherInit_ex.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDA349C94F), ref: 00007FFDA349A964
                                            • EVP_CIPHER_CTX_ctrl.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDA349C94F), ref: 00007FFDA349A97B
                                            • EVP_CIPHER_CTX_ctrl.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDA349C94F), ref: 00007FFDA349A997
                                            • OPENSSL_cleanse.LIBCRYPTO-1_1(?,?,?,?,?,00000374,00000000,?,00007FFDA349C94F), ref: 00007FFDA349AA00
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X_ctrl$CipherD_sizeInit_exL_cleanseR_flags
                                            • String ID: ..\s\ssl\tls13_enc.c$key
                                            • API String ID: 3239367310-4187096943
                                            • Opcode ID: e366a80e04ad7f05f707bfdd723eb556b5af04d9e61b6fad2fcb7e1a51eb478f
                                            • Instruction ID: 8ec0a5fd4112eb566a6f47670c638a3199245787ae43b4f90024a7e9679d84d5
                                            • Opcode Fuzzy Hash: e366a80e04ad7f05f707bfdd723eb556b5af04d9e61b6fad2fcb7e1a51eb478f
                                            • Instruction Fuzzy Hash: 0261B43270AB8586E770DB12E8607AAB7A6FB84784F040135EE8D97B56DF7DD141CB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Y_free
                                            • String ID: ..\s\ssl\statem\statem_srvr.c
                                            • API String ID: 1282063954-348624464
                                            • Opcode ID: 8e3f657c601740043fa3662c5f3b5e498c8f561f7bf86359dacada4deeb4db11
                                            • Instruction ID: 5d1d1abf62a5e0c0700f811fe6b8856120c52215c19923e9d2ca07459377c8b8
                                            • Opcode Fuzzy Hash: 8e3f657c601740043fa3662c5f3b5e498c8f561f7bf86359dacada4deeb4db11
                                            • Instruction Fuzzy Hash: FC41D32170A74185EB60DF92A425779BB92FF44B80F044130EE5DABB86CFBEE5418708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlO_freeO_newO_s_fileR_put_errorX509_free
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 785824201-2723262194
                                            • Opcode ID: 68fdddc80706359ddf8a122cfcea2bae28c583e8c2ac54a85244af1e198ddf9f
                                            • Instruction ID: 4269f1c4c65bc70c813882fdb91ab24aac952475d88777ed7cd763f68b13d7c8
                                            • Opcode Fuzzy Hash: 68fdddc80706359ddf8a122cfcea2bae28c583e8c2ac54a85244af1e198ddf9f
                                            • Instruction Fuzzy Hash: 4031F721F0E69286F7349F5294207BAAA93AF44BC4F044031ED4DABB87DFBEE5504748
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlO_freeO_newO_s_fileR_put_error
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 2618924202-2723262194
                                            • Opcode ID: 0a8cb36a2c879b170d620c47efc03db905d3e35ec53f4515d71cbbbeeb0fdf7a
                                            • Instruction ID: bb4c4dec9a990b2c1738b8f80f73f9ecd7b4785cda7ca95873478545317fee2f
                                            • Opcode Fuzzy Hash: 0a8cb36a2c879b170d620c47efc03db905d3e35ec53f4515d71cbbbeeb0fdf7a
                                            • Instruction Fuzzy Hash: DA31B561B0E74686F674DF5294202BAA752EB45BC4F044031EE4DABB87DFBEE5508708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_puts$O_printf
                                            • String ID: Master-Key:$%02X$RSA $Session-ID:
                                            • API String ID: 4098839300-1878088908
                                            • Opcode ID: e85465dfd3a6e6c90a38dc768647ac6b9d8c5a8c1a23fe951f9e373ad97b31e8
                                            • Instruction ID: 3174b20d9b12216b9d165a58d68004f0f9562623a46fe1709255e5fd9a1a6984
                                            • Opcode Fuzzy Hash: e85465dfd3a6e6c90a38dc768647ac6b9d8c5a8c1a23fe951f9e373ad97b31e8
                                            • Instruction Fuzzy Hash: E8317721B0EA4285F694AF1599743786793FF44780F585070EA0DD6BA7DFADE4718308
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrl$R_flagsX_cipher$D_sizeX_block_sizeX_md
                                            • String ID:
                                            • API String ID: 1400698538-0
                                            • Opcode ID: e2d655eb6f4302d8af4f816aa37d17fcfe3f3e8fc88037acef2b31e56c47e0c3
                                            • Instruction ID: f844e63e7d3560d15b3a79545e35a5f0cdbec905deb339c8ed19b171fb281081
                                            • Opcode Fuzzy Hash: e2d655eb6f4302d8af4f816aa37d17fcfe3f3e8fc88037acef2b31e56c47e0c3
                                            • Instruction Fuzzy Hash: C4D1C423B0A7D586EB518F2680603BD37A2EB55B84F088536DE8DA7387DE7DD084C355
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_new
                                            • String ID:
                                            • API String ID: 4227620691-0
                                            • Opcode ID: 569b6062c0f20e162d5319ae94aa93e2d036ec8f877403341560926360eaf532
                                            • Instruction ID: bbba78c9e8c5d2c5ccb92331eefe59d7aee15da28bf7e6d3517833fa2392bfbb
                                            • Opcode Fuzzy Hash: 569b6062c0f20e162d5319ae94aa93e2d036ec8f877403341560926360eaf532
                                            • Instruction Fuzzy Hash: 28215E04F0F78645FD6CA75255722B91692AF46BC4F040034EE4EEBB8BEEAEE4414708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: , value=$..\s\ssl\ssl_conf.c$cmd=
                                            • API String ID: 1767461275-2539137415
                                            • Opcode ID: 6f5fa976fdc21c662024ae26816687f03e4be8bcdd26a407f4cb266dff922d12
                                            • Instruction ID: 6cc05696201a14a6dc5e48079f089238cb6d5caccbc7285d26cc1821f6baecad
                                            • Opcode Fuzzy Hash: 6f5fa976fdc21c662024ae26816687f03e4be8bcdd26a407f4cb266dff922d12
                                            • Instruction Fuzzy Hash: 5D51A572F0A60282FB548B15F4603A963A2FB84744F444136DB5C977DADFBED9948B08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$Y_new
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 2632022502-2723262194
                                            • Opcode ID: 3fa2f0e6f69a6a838d94406baac50519cd885df6768811c83b1c210ad9617fea
                                            • Instruction ID: d8dfa8662087873c86c4883887a98ba926064ffd3ea84bfc1abf3f9a0b6f6ae3
                                            • Opcode Fuzzy Hash: 3fa2f0e6f69a6a838d94406baac50519cd885df6768811c83b1c210ad9617fea
                                            • Instruction Fuzzy Hash: 6821A721B0D64186E710EB66A5212F9A3A2EF857C4F480030EB4C97B97DF6ED5918708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlO_free_allO_method_typeO_newO_nextO_up_refR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 3681941280-1080266419
                                            • Opcode ID: 13eb3f40a408d3379ae34058fc5715a900e46340c6b22161b81b81d3a9d6b653
                                            • Instruction ID: 45c03c2045c0556fbf7154498b8a2b3d4785c81261f5938029f455560c3af471
                                            • Opcode Fuzzy Hash: 13eb3f40a408d3379ae34058fc5715a900e46340c6b22161b81b81d3a9d6b653
                                            • Instruction Fuzzy Hash: EE21D622F0A65283EBA0DB11E4615BE6351EF847C4F180431EA4EE7787DEAEE8418B44
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: P_resp_count$E_freeL_sk_new_nullP_freeP_get1_ext_d2iP_resp_get0P_response_get1_basicR_put_errorT_freed2i_
                                            • String ID:
                                            • API String ID: 4245524859-0
                                            • Opcode ID: 741c6e6be6a0707780ebfb8c2d7050555c9a934290be2e2d2d38b17e810f51c1
                                            • Instruction ID: 56dfb8ea1470598069e9d66801c6789272fd22fd8151172cae399e8840182dae
                                            • Opcode Fuzzy Hash: 741c6e6be6a0707780ebfb8c2d7050555c9a934290be2e2d2d38b17e810f51c1
                                            • Instruction Fuzzy Hash: 2B21C411F0F76242ED64AAA6646137916D2AF88BC0F840035EE0DD7793EEFEEC418348
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_set_flags$O_set_retry_reason$O_clear_flagsO_get_retry_reason
                                            • String ID:
                                            • API String ID: 3610643084-0
                                            • Opcode ID: 7c2e9297198fbe8bbaa2a4c3eec53a66c110abc671760b54cd415acdbed01445
                                            • Instruction ID: 8974ebfa96599f866a5d6aece8878bb5b77b8e75735f47647a357c273e7e2631
                                            • Opcode Fuzzy Hash: 7c2e9297198fbe8bbaa2a4c3eec53a66c110abc671760b54cd415acdbed01445
                                            • Instruction Fuzzy Hash: B2113C11F0E11642F628B27690332BD12838F86B80F544435E909EBB8BDEAFE543420E
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Y_id
                                            • String ID: ..\s\ssl\t1_lib.c
                                            • API String ID: 239174422-1643863364
                                            • Opcode ID: c0dd915cbf48b28733fe5b9d9ac6ada7c5cf0a8300dd814d9dde8c03441deb39
                                            • Instruction ID: a0b48b1cf34d5e917bbfbb7972f52126e8f71c9015f52a942a0beaf386da43e0
                                            • Opcode Fuzzy Hash: c0dd915cbf48b28733fe5b9d9ac6ada7c5cf0a8300dd814d9dde8c03441deb39
                                            • Instruction Fuzzy Hash: E8B1E631B0E24282FBA49B15D06467D2692EB447A8F144035DE6DEB7D7CEBEE981C70C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlO_freeO_newO_s_fileR_put_error
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 2618924202-2723262194
                                            • Opcode ID: 1789b7f0d02e542ab6b32618a4feb67c2845470d050f9019444c39f0ae2351e7
                                            • Instruction ID: 34295bc1592027147437aafdd3762019a12b2cc22db1be2af39af0fc2e24df22
                                            • Opcode Fuzzy Hash: 1789b7f0d02e542ab6b32618a4feb67c2845470d050f9019444c39f0ae2351e7
                                            • Instruction Fuzzy Hash: BF31C721B0E78282F6349F5294602BE6253FB457C4F044035EE8DABB87DFBEE5518748
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_sizeDigestFinal_exX_copy_exX_freeX_mdX_new
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 2082763299-1080266419
                                            • Opcode ID: 6fafbb813f3c90a8b0ecf3d9fb55de0c2d6812930547c3e67c08dcc7d4d451ba
                                            • Instruction ID: 5dcc8f664f1d6ec6b548d21672af2fa445139b44d8804ed34026e1097ee03e98
                                            • Opcode Fuzzy Hash: 6fafbb813f3c90a8b0ecf3d9fb55de0c2d6812930547c3e67c08dcc7d4d451ba
                                            • Instruction Fuzzy Hash: 4C21F535F0E35241F620EB56B8616BAB693BB84BC4F144030EE4D97797DEBED4818708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_freeO_newO_s_fileR_clear_errorR_put_errorX509_free
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 1025733963-2723262194
                                            • Opcode ID: 6aa9955067a2bf2b897889b9280fb51e01d0811f73bfa31f6dda62bb50fb6415
                                            • Instruction ID: 18187c6bca214b3d8c1d4791d6a0eb3374a418358aaeadf9f73667f57757ff75
                                            • Opcode Fuzzy Hash: 6aa9955067a2bf2b897889b9280fb51e01d0811f73bfa31f6dda62bb50fb6415
                                            • Instruction Fuzzy Hash: 1411E922B0E782D5F614EF52A42126AA652BF44B84F044031FE4CE7747CF7DE4518708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_f_bufferO_int_ctrlO_newO_push
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1655923927-1080266419
                                            • Opcode ID: ab03b8435c53bbb2385763fffbc927048ad75653c08c6005caab1ccea8af9f44
                                            • Instruction ID: 1552d001234dd348654e190c52075d608afc75bd78eb10e33e02d730c48a87a9
                                            • Opcode Fuzzy Hash: ab03b8435c53bbb2385763fffbc927048ad75653c08c6005caab1ccea8af9f44
                                            • Instruction Fuzzy Hash: 3C118621F0A64282EB509B56F5217A963A1AF45780F440530EB0D9BB97EF7FE5918704
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$L_sk_valueY_id
                                            • String ID:
                                            • API String ID: 483135270-0
                                            • Opcode ID: e146751ec1b6ab12bb7c2c7c8349d56fe264cd30052a34a0a6e488871a7bc426
                                            • Instruction ID: 1adeefc799b2a62ae5cf2a11445c1e4ef399c3315f2b1b221568d55c279dddb3
                                            • Opcode Fuzzy Hash: e146751ec1b6ab12bb7c2c7c8349d56fe264cd30052a34a0a6e488871a7bc426
                                            • Instruction Fuzzy Hash: 5A619221B0E64385FA64962294712B92E93BF85B84F145432DE4EF73C3DEAFE481970D
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: J_nid2sn$D_sizeP_get_cipherbynameP_get_digestbynameR_block_sizeR_flagsR_iv_length
                                            • String ID:
                                            • API String ID: 4211416117-0
                                            • Opcode ID: aa788c77f345a098ac4b36ea34b8179a2edc08a92ca35d2f033f8f02c159b9de
                                            • Instruction ID: 31b979d1ce2ea6f2bf84f460fe7af9fb025e1f231abbcbcd16cfcb7c0d7d823e
                                            • Opcode Fuzzy Hash: aa788c77f345a098ac4b36ea34b8179a2edc08a92ca35d2f033f8f02c159b9de
                                            • Instruction Fuzzy Hash: 6D41C531F1F61287FA649A15A4746796292AF58B90F144532EE4DE37C3CEBEF8428348
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$E_dupL_sk_new_nullL_sk_valueX509_
                                            • String ID:
                                            • API String ID: 3273602126-0
                                            • Opcode ID: b4deca53353f4515e3d79b8aab1b87a01d090af3fd3c3820473ef2d78fc71af8
                                            • Instruction ID: ad1f0f0a73d3d9c35ec1a0782c6ba9935a29951fcc9afd6bf2b352376d6d9571
                                            • Opcode Fuzzy Hash: b4deca53353f4515e3d79b8aab1b87a01d090af3fd3c3820473ef2d78fc71af8
                                            • Instruction Fuzzy Hash: 7621C821F0EB4285FA64EB2654611796292AF85BC4F040031FE4EE7B87DEAFE4818708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_free$O_new$O_s_connect
                                            • String ID:
                                            • API String ID: 3895418919-0
                                            • Opcode ID: 6433569600e4c61825558ea52e62ecc1ab3bf90f244ac560bbb42568f2472a62
                                            • Instruction ID: 50c7d30af2b8ede6094a53f1efc8e1e6abcee70d039bc5eb819cf14460aff920
                                            • Opcode Fuzzy Hash: 6433569600e4c61825558ea52e62ecc1ab3bf90f244ac560bbb42568f2472a62
                                            • Instruction Fuzzy Hash: C0114C00F0F75641F998B75264732B916829F85BC4F080430E91EABB8BEEAEE451430C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 0-592572767
                                            • Opcode ID: c927fe1bdb2ea0dc208643f5703eafe151e19c715c7a42174d702599c544fa67
                                            • Instruction ID: ccb54893b16be13a6bc7796f538b7798f3e3b464dab26e58e028f597dfaa8f6c
                                            • Opcode Fuzzy Hash: c927fe1bdb2ea0dc208643f5703eafe151e19c715c7a42174d702599c544fa67
                                            • Instruction Fuzzy Hash: 2791B672B1A75186E7648F11E5202B977D2FB80BC0F484131EA8D97B96DFBDE191CB04
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 0-1507966698
                                            • Opcode ID: 8beb55ac1aef9f552cc5c5eee86720c7a55d898619dd2faa17e34071f6398088
                                            • Instruction ID: 4eb499c753a40b4bc4da953e5b7f8d3ce2c34077506b842ae1eaef80b03236fa
                                            • Opcode Fuzzy Hash: 8beb55ac1aef9f552cc5c5eee86720c7a55d898619dd2faa17e34071f6398088
                                            • Instruction Fuzzy Hash: 49719672B0D74181EB50DF56E4502AEA3A2EB84BD4F044131DE4D9779ADFBEE881CB08
                                            APIs
                                            • BN_bin2bn.LIBCRYPTO-1_1(?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E140), ref: 00007FFDA3480D3C
                                            • BN_bin2bn.LIBCRYPTO-1_1(?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E140), ref: 00007FFDA3480D59
                                            • BN_bin2bn.LIBCRYPTO-1_1(?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E140), ref: 00007FFDA3480D76
                                            • BN_bin2bn.LIBCRYPTO-1_1(?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E140), ref: 00007FFDA3480D8F
                                            • X509_get0_pubkey.LIBCRYPTO-1_1(?,00000000,00000000,?,..\s\ssl\statem\statem_clnt.c,00007FFDA347E140), ref: 00007FFDA3480DCE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: N_bin2bn$X509_get0_pubkey
                                            • String ID: ..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 3650846462-1507966698
                                            • Opcode ID: fe50a2ecc3c8e04a7c1f821741a42b66c01268c629289436dbea9068b983fa2b
                                            • Instruction ID: 3ce007b0479c0083a3cc0111c94a291e49a0e70247a9aa75f0d32c1a678c32fa
                                            • Opcode Fuzzy Hash: fe50a2ecc3c8e04a7c1f821741a42b66c01268c629289436dbea9068b983fa2b
                                            • Instruction Fuzzy Hash: 1361D522B3AB8142E7918B25A8145BEB791FF85784F049130FECD67756EF7DE1908B04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_pop_free$E_freeL_sk_newL_sk_pushX509_
                                            • String ID: ..\s\ssl\statem\statem_lib.c
                                            • API String ID: 3595667005-2839845709
                                            • Opcode ID: 65b43fd9f55fca63a07499a22a29012c049ef829442079be65c1fb5db74c0ef2
                                            • Instruction ID: fff9c855f2895ab828e397b3ba74d153894e4aa1b4443153ba9cadd930ee0c92
                                            • Opcode Fuzzy Hash: 65b43fd9f55fca63a07499a22a29012c049ef829442079be65c1fb5db74c0ef2
                                            • Instruction Fuzzy Hash: A4510771B0E68182EB209B65E4663B96692FB84784F448135EE8DA7B87DFBDD140C708
                                            APIs
                                            • OPENSSL_sk_num.LIBCRYPTO-1_1 ref: 00007FFDA345F65C
                                            • OPENSSL_sk_num.LIBCRYPTO-1_1 ref: 00007FFDA345F673
                                            • CT_POLICY_EVAL_CTX_new.LIBCRYPTO-1_1 ref: 00007FFDA345F69F
                                            • CT_POLICY_EVAL_CTX_free.LIBCRYPTO-1_1 ref: 00007FFDA345F6D8
                                            • OPENSSL_sk_value.LIBCRYPTO-1_1 ref: 00007FFDA345F6EE
                                              • Part of subcall function 00007FFDA3431C0D: SCT_LIST_free.LIBCRYPTO-1_1 ref: 00007FFDA34581B3
                                              • Part of subcall function 00007FFDA3431C0D: d2i_OCSP_RESPONSE.LIBCRYPTO-1_1 ref: 00007FFDA3458208
                                              • Part of subcall function 00007FFDA3431C0D: OCSP_response_get1_basic.LIBCRYPTO-1_1 ref: 00007FFDA3458218
                                              • Part of subcall function 00007FFDA3431C0D: OCSP_resp_count.LIBCRYPTO-1_1 ref: 00007FFDA345822A
                                              • Part of subcall function 00007FFDA3431C0D: OCSP_resp_get0.LIBCRYPTO-1_1 ref: 00007FFDA3458238
                                              • Part of subcall function 00007FFDA3431C0D: OCSP_SINGLERESP_get1_ext_d2i.LIBCRYPTO-1_1 ref: 00007FFDA3458250
                                              • Part of subcall function 00007FFDA3431C0D: OCSP_resp_count.LIBCRYPTO-1_1 ref: 00007FFDA3458278
                                              • Part of subcall function 00007FFDA3431C0D: SCT_LIST_free.LIBCRYPTO-1_1 ref: 00007FFDA3458284
                                              • Part of subcall function 00007FFDA3431C0D: OCSP_BASICRESP_free.LIBCRYPTO-1_1 ref: 00007FFDA345828C
                                              • Part of subcall function 00007FFDA3431C0D: OCSP_RESPONSE_free.LIBCRYPTO-1_1 ref: 00007FFDA3458294
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_numP_resp_countT_free$E_freeL_sk_valueP_freeP_get1_ext_d2iP_resp_get0P_response_get1_basicX_freeX_newd2i_
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 382793502-1080266419
                                            • Opcode ID: 4a8da2e031a4b4fb6d40b0e9788500d950f4d2d5ada47d43d296033219d23ec1
                                            • Instruction ID: fb7777cfe9d90daaeab54794d555f8cb538eec0f369649e530d5e80d3fb6957f
                                            • Opcode Fuzzy Hash: 4a8da2e031a4b4fb6d40b0e9788500d950f4d2d5ada47d43d296033219d23ec1
                                            • Instruction Fuzzy Hash: A141FA21F0B742C5FA64AA1195702BD6392EF45B84F484036DE0DE77A3DEBEE8428709
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Y_free
                                            • String ID: ..\s\ssl\statem\statem_srvr.c
                                            • API String ID: 1282063954-348624464
                                            • Opcode ID: 32a2037f69fb0e8ea2d16fc68d07f4a021f43c55029d368323f1534c015843c1
                                            • Instruction ID: b181a724718f52ea106c3baac252fa1424a901060b4e95925133f1302be7aac1
                                            • Opcode Fuzzy Hash: 32a2037f69fb0e8ea2d16fc68d07f4a021f43c55029d368323f1534c015843c1
                                            • Instruction Fuzzy Hash: AF41B07270A74182E7209F41E4606BDBBA2FB44BC4F444130DE4CABB92DFBDE6958708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: H_freeN_free$H_newH_set0_pqgY_security_bits
                                            • String ID:
                                            • API String ID: 3535209601-0
                                            • Opcode ID: 82d4d84c1f2dfdddcedad446bcd47900afc2325e3b559e45cb9db292ef8495da
                                            • Instruction ID: 32cdae489d28fa9eaa0ba6e7399a4c9410204915ca3f4464ed30e4e080155446
                                            • Opcode Fuzzy Hash: 82d4d84c1f2dfdddcedad446bcd47900afc2325e3b559e45cb9db292ef8495da
                                            • Instruction Fuzzy Hash: F531D310B0F64285FEE4A666907537D1293AF44B94F280071EE4DE77D7DEAFE4828709
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$L_sk_valueX509_i2d_
                                            • String ID: ..\s\ssl\statem\statem_lib.c$2
                                            • API String ID: 3754435392-3488551833
                                            • Opcode ID: c50b85bc3bcbec496a441513fc36b76c6478cab3b6888f1826de5002a44e3c7a
                                            • Instruction ID: 3bcc55380685e5e681d4aa34f4228cc8ecda25d8800981d34ae0b06e3af04fd5
                                            • Opcode Fuzzy Hash: c50b85bc3bcbec496a441513fc36b76c6478cab3b6888f1826de5002a44e3c7a
                                            • Instruction Fuzzy Hash: 9931B831B0E75246FA209B62B46617A6796AF447D0F440430ED4CE7B9BDFBEE5418708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlO_freeX_new
                                            • String ID: ..\s\ssl\s3_enc.c
                                            • API String ID: 22238829-1839494539
                                            • Opcode ID: 4cf59fbcf39c19b4635e50e9352caef68878f1dbfee15a521ec02f95a7f032fb
                                            • Instruction ID: 41e17cb3529ed0b1c521679796a8a161fd1685f4e0a2c810420a18a22f1cba6c
                                            • Opcode Fuzzy Hash: 4cf59fbcf39c19b4635e50e9352caef68878f1dbfee15a521ec02f95a7f032fb
                                            • Instruction Fuzzy Hash: FE41C632B0AA8185EB90DF15E4613AE63A1FB84BC4F184431DF4DAB796DFBED5818704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$L_sk_pop_freeL_sk_valueR_put_error
                                            • String ID: ..\s\ssl\ssl_cert.c
                                            • API String ID: 732311666-349359282
                                            • Opcode ID: ab10a35f01cc659bf1d8b89c5a6f0d2dffd631ccd2e4279cb355084bd3584024
                                            • Instruction ID: ff325036107d2a325c152baa0ab0e2bceaa11a13070a376f89069963116752f1
                                            • Opcode Fuzzy Hash: ab10a35f01cc659bf1d8b89c5a6f0d2dffd631ccd2e4279cb355084bd3584024
                                            • Instruction Fuzzy Hash: 7521C721B0D68186EB509B26A5612B9A792EF847D0F080431EE4DD7B57DFBDD4818708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_numL_sk_pop_free$L_sk_new_reserveL_sk_valueR_put_errorX509_free
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1042751175-1080266419
                                            • Opcode ID: c8709bc90463c25e43f5416343c086df3d95b911cc0f9f76808430255535cb40
                                            • Instruction ID: 71637e3437135f52d70458cc9f053f7cde6a4cdc0712f4cd31ca18664f010040
                                            • Opcode Fuzzy Hash: c8709bc90463c25e43f5416343c086df3d95b911cc0f9f76808430255535cb40
                                            • Instruction Fuzzy Hash: 4D318232B09B8282D714DB21D4603AAB766EB85784F048535EE8DE3797DFBDD980C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_push$L_sk_new_nullL_sk_popR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1161573302-1080266419
                                            • Opcode ID: bda7fbef5f85bf2da651fee9b55fbaaa1bdd381d02e10f8cf18bd424cfbb4574
                                            • Instruction ID: cce121315a7b4474776cc6cd7a15481cde90f2bea7e4d6d3d40afa6f5399e2ad
                                            • Opcode Fuzzy Hash: bda7fbef5f85bf2da651fee9b55fbaaa1bdd381d02e10f8cf18bd424cfbb4574
                                            • Instruction Fuzzy Hash: CA219231F0E75281EA64DB12946017963A6AF84B84F044034EF4CE7B87EFBEEC518708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$L_sk_value
                                            • String ID: .$..\s\ssl\ssl_lib.c
                                            • API String ID: 1603723057-3129112277
                                            • Opcode ID: b72c28661eed6e8c4b2e4fa7bc11301fefc2f41408c8ec5aef2a7f084d48a451
                                            • Instruction ID: 7e8c55588d8314a5452f0d17619ac634f40320ec668da1d34ac4288ac67c4efc
                                            • Opcode Fuzzy Hash: b72c28661eed6e8c4b2e4fa7bc11301fefc2f41408c8ec5aef2a7f084d48a451
                                            • Instruction Fuzzy Hash: 6021D132B1A75182E750DB19E4612ED73A2EB88B88F540035EF4D93797DF7ED9828708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$X509X509_freed2i_
                                            • String ID: $$..\s\ssl\ssl_rsa.c
                                            • API String ID: 954790205-1365392022
                                            • Opcode ID: 8123ee464354afcc639de9f72456eb075dd14d3bf39af6b8b4cd5c163378acc6
                                            • Instruction ID: baa46058968cc376d345277f51f2314378cba5b2574ce52c6cd972d438865278
                                            • Opcode Fuzzy Hash: 8123ee464354afcc639de9f72456eb075dd14d3bf39af6b8b4cd5c163378acc6
                                            • Instruction Fuzzy Hash: 6D11C821B0D68246EB64DF25E4202BE6393FB84384F444434EA4DD7B97DFBEE5508708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X509_get0_pubkeyY_security_bits$X509_get_extension_flagsX509_get_signature_info
                                            • String ID:
                                            • API String ID: 3342971904-0
                                            • Opcode ID: 08c03ed49113836e02b49540d5dc46bd2e33150568e8b52750016b53a8b39fe6
                                            • Instruction ID: ba319c39e35583ae0e1ff539ca858495093081768026f4b8621199474015f989
                                            • Opcode Fuzzy Hash: 08c03ed49113836e02b49540d5dc46bd2e33150568e8b52750016b53a8b39fe6
                                            • Instruction Fuzzy Hash: A1412B21F0E28282FB74EA5674217B96282BF84784F544071ED4DE7B87DFBEE8014B08
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$L_sk_findL_sk_value
                                            • String ID:
                                            • API String ID: 1561070308-0
                                            • Opcode ID: b0c26986137e19823e1672b279a128acca08b0c3bc2b92852cfdc3ce144995f4
                                            • Instruction ID: e03f856738b05d89b7f5405919465df0cf97a94d6c94f44fd4922f430d60803c
                                            • Opcode Fuzzy Hash: b0c26986137e19823e1672b279a128acca08b0c3bc2b92852cfdc3ce144995f4
                                            • Instruction Fuzzy Hash: 5741E821F0E78285FBA49A65542137977D2AB45BC0F084835EE4DE7787DEBED881C308
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$L_sk_new_nullL_sk_pushL_sk_value
                                            • String ID:
                                            • API String ID: 542606518-0
                                            • Opcode ID: 45e2f6b10577ecd7920a06ad24a4fc6e3860420013ab6b207b4ccb3cd9d89438
                                            • Instruction ID: 3b59a2988de5836aebc8af806496914ee04607da809a8974f4dba057b2ebe3cc
                                            • Opcode Fuzzy Hash: 45e2f6b10577ecd7920a06ad24a4fc6e3860420013ab6b207b4ccb3cd9d89438
                                            • Instruction Fuzzy Hash: EE21E721F0F75281FA64AB12546127962969F95FC1F080031DE4DF7B97EFAFE8824708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_next$O_free_all$O_up_ref
                                            • String ID:
                                            • API String ID: 1216991848-0
                                            • Opcode ID: 74667a3e871d2ac80a38afecdc9d9d0b5730101d0e0a977703ff73bd62255f4f
                                            • Instruction ID: 3a16dd9354cd1ffc377471c684b52c87f43344f6d7fab8449b1f9b1a1436e0fc
                                            • Opcode Fuzzy Hash: 74667a3e871d2ac80a38afecdc9d9d0b5730101d0e0a977703ff73bd62255f4f
                                            • Instruction Fuzzy Hash: 55217411F0B75181EE66AB15D16113C5392EF44BC4B050431EE4DA7B8BDFADEC918708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X_free
                                            • String ID:
                                            • API String ID: 2268491255-0
                                            • Opcode ID: 6493352eb6d6ed3341580a2395efd01224b6157228b4c69fa8689b251ece88ee
                                            • Instruction ID: 38bb84fba191044b82e318418132e22b16fda34c0f98189a540ac3baea89cbe7
                                            • Opcode Fuzzy Hash: 6493352eb6d6ed3341580a2395efd01224b6157228b4c69fa8689b251ece88ee
                                            • Instruction Fuzzy Hash: 1C012972B1AA8141D750AF61D9513BC63A5EF80F89F080035DF4D9B797CF65D490832C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: memcpy$ErrorLastO_read
                                            • String ID: ..\s\ssl\record\rec_layer_s3.c
                                            • API String ID: 1958097105-2209325370
                                            • Opcode ID: 3dcb4004876841d817ef47d2efc369b4e2620c560bc807afff1c78d3bfb42160
                                            • Instruction ID: 44504be6b73ef869e8d842c65fd528796c49d343805d8b342d75cbf98f0d3e5f
                                            • Opcode Fuzzy Hash: 3dcb4004876841d817ef47d2efc369b4e2620c560bc807afff1c78d3bfb42160
                                            • Instruction Fuzzy Hash: 0081C532B0AB8982EB549E21D5643BD63A2FB41F98F144135DD4CA778ACFBED445C304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlmemcpy
                                            • String ID: ..\s\ssl\statem\statem_lib.c$TLS 1.3, client CertificateVerify$TLS 1.3, server CertificateVerify
                                            • API String ID: 2266715306-2608420995
                                            • Opcode ID: 15aa47485ae97e114c81045a7148ccf703e01fe5c933243fd750f331446eba2e
                                            • Instruction ID: 597fdf0b053e310f55b402c71b722bb867d97e5e1f7725ccf1185b412cc7059c
                                            • Opcode Fuzzy Hash: 15aa47485ae97e114c81045a7148ccf703e01fe5c933243fd750f331446eba2e
                                            • Instruction Fuzzy Hash: D641B022B0AB8282E710CF28D4612BD77A1FB55B84F544132DB8CE7762DF6ED1A5C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_num$L_sk_value
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1603723057-1080266419
                                            • Opcode ID: 792a7ce2ecfafcfa269ffd79d35873fb8a2162825072a8662e8cf8d35527f56e
                                            • Instruction ID: f44942e970f51db2e3f2fb75507b5674681295d2f91ea3b10ee899beb4ee667f
                                            • Opcode Fuzzy Hash: 792a7ce2ecfafcfa269ffd79d35873fb8a2162825072a8662e8cf8d35527f56e
                                            • Instruction Fuzzy Hash: 9A219632B1A75182E710DF19E0512A9B3E2EB84B84F540035EF4D937A6DF7FD9828B08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlO_freeO_newX_free
                                            • String ID: ..\s\ssl\s3_enc.c
                                            • API String ID: 3686289451-1839494539
                                            • Opcode ID: 7184764af4828457676a05604ef11b2bd870a9ee6f5aded71f74c8ce5a10fc40
                                            • Instruction ID: 791446a40f67a9e5c4737180bc2db80e4f6987423d3ac136e4f7ebc7052d8692
                                            • Opcode Fuzzy Hash: 7184764af4828457676a05604ef11b2bd870a9ee6f5aded71f74c8ce5a10fc40
                                            • Instruction Fuzzy Hash: A7217C32B09B8195EB50DF25E4613EC33A1FB89B88F088531DE4D9B756DFBAD0848704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_new_nullL_sk_pushR_put_errorX509_up_ref
                                            • String ID: ..\s\ssl\ssl_cert.c
                                            • API String ID: 1254856836-349359282
                                            • Opcode ID: de222332ab560ae41cd398fca7d233f04ed90fb3ee78e9fc6952b7ca29800a53
                                            • Instruction ID: fed100e09a8dca263721a557283d973dffaa0086b7a5b4079ed0045b495279cf
                                            • Opcode Fuzzy Hash: de222332ab560ae41cd398fca7d233f04ed90fb3ee78e9fc6952b7ca29800a53
                                            • Instruction Fuzzy Hash: C5118221B0E64287FBA49B61F5613B962A2EF44B84F080531EE4CD7787DFBED4908708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_numR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c$ALL:!COMPLEMENTOFDEFAULT:!eNULL$TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256
                                            • API String ID: 3481481725-2408151667
                                            • Opcode ID: 317e8ca95c8adfb34f4cd1c9d50b9473096ef48f220615104f65b565feef6649
                                            • Instruction ID: 3375a80291167f3e5213b795b105f46026e8991de0ca358f3fbe4ad0b482d06d
                                            • Opcode Fuzzy Hash: 317e8ca95c8adfb34f4cd1c9d50b9473096ef48f220615104f65b565feef6649
                                            • Instruction Fuzzy Hash: 32118262F1A74681E7209B20D4212B93392AF44B48F444131E94DE7796DFBEE549C708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: A_sizeD_sizeP_get_curve_nameR_pop_to_markY_get0_Y_get0_group
                                            • String ID:
                                            • API String ID: 2524731747-0
                                            • Opcode ID: 6075d711208a0826b2fa15ed87acc049cad3210ebe7160a18e31799764006937
                                            • Instruction ID: a108392291d3f048db06cbd991ac9d4993624ff1984b449bb47c49db6eec566a
                                            • Opcode Fuzzy Hash: 6075d711208a0826b2fa15ed87acc049cad3210ebe7160a18e31799764006937
                                            • Instruction Fuzzy Hash: CB51A526B0EA4241EF64EE22D4621B923D6EF85B84F080535DE0ED77D7DEBDE4418788
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: H_freeO_ctrlO_freeO_newO_s_file
                                            • String ID:
                                            • API String ID: 1469330667-0
                                            • Opcode ID: 81a29b65ec075d8b662f60f15598d46dcf3bbee5504e15bf2f78ed5bf6019a91
                                            • Instruction ID: 642a989d23533bba534a91266a90047938842e9696ccc4acd549b59a9cdba739
                                            • Opcode Fuzzy Hash: 81a29b65ec075d8b662f60f15598d46dcf3bbee5504e15bf2f78ed5bf6019a91
                                            • Instruction Fuzzy Hash: A721F812B0B65146FA65EE56A46277A2292AF44FC0F044032EF0DE7B47DE7ED8114744
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X509_$E_dupE_freeL_sk_new_nullL_sk_pushX509_get_subject_name
                                            • String ID:
                                            • API String ID: 2231116090-0
                                            • Opcode ID: 82492383bb986031a130ce332d8c4117b49648594df4aaa9f1e28b13961d9d88
                                            • Instruction ID: 8f7adc775569a431fe7c8d2f871daf0293c7a96cce17d8b4d93c20430705b904
                                            • Opcode Fuzzy Hash: 82492383bb986031a130ce332d8c4117b49648594df4aaa9f1e28b13961d9d88
                                            • Instruction Fuzzy Hash: E6016261F0F74241FF65AA65A5653B852D29F48BC4F080430EE1CEB787EEAEE4C04308
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_size$_time64
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 2874025382-592572767
                                            • Opcode ID: 51edfa5d44c433f1c96c1318db48a2aa5f157a6a6b0e2826954d9ef86924e852
                                            • Instruction ID: b564ffc27114a0529f0a50d885b24f24709cfc340da281b7533ea50c289fbbbc
                                            • Opcode Fuzzy Hash: 51edfa5d44c433f1c96c1318db48a2aa5f157a6a6b0e2826954d9ef86924e852
                                            • Instruction Fuzzy Hash: EBB1A57170E78282EA64DF12956027E7692FB84B84F140036DE4DE7B96DFBEE851C708
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\statem\statem.c
                                            • API String ID: 0-2512360314
                                            • Opcode ID: f4b82ac2777e7e13ee3f52d1b79094b7e670554c20a499e59a0f01eee76fc5dd
                                            • Instruction ID: 0009cc16b5f8162dc461e637b360416e8c44af710da64226d19bccb84fa9c8c0
                                            • Opcode Fuzzy Hash: f4b82ac2777e7e13ee3f52d1b79094b7e670554c20a499e59a0f01eee76fc5dd
                                            • Instruction Fuzzy Hash: 57A19232F0A68685FBA49F25D4643B937A2FB44B48F444036CA4DA7796CFBED485C708
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 0-592572767
                                            • Opcode ID: e9db389cdf114de96548232ef87d74519a0118fba9b4cd399f754a5bbeac702e
                                            • Instruction ID: bf6c6d1003222398ecaf3b1fccacc3be3b0d33380b470611be487bdce7d305bd
                                            • Opcode Fuzzy Hash: e9db389cdf114de96548232ef87d74519a0118fba9b4cd399f754a5bbeac702e
                                            • Instruction Fuzzy Hash: 1341173270EB4185E7609F11E4611AD77A2FB84B90F480532DA9C93BA6DFBED4B1CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_snprintf
                                            • String ID: ECDSA$IDEA(128)$SHA256
                                            • API String ID: 3142812517-1715931570
                                            • Opcode ID: 44f7624beab0f323a905dc14c414133b54598305496cbad7365f801c86930631
                                            • Instruction ID: 826f2b4396fdd59f97f6b7dc6eb1bfded445e0238ca9666780e3bce2b93ed9a2
                                            • Opcode Fuzzy Hash: 44f7624beab0f323a905dc14c414133b54598305496cbad7365f801c86930631
                                            • Instruction Fuzzy Hash: 54116632F0EF4242F2B58668A4B81755662BB47340F050136DD4DB2BA78EFFE941860C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_snprintf
                                            • String ID: IDEA(128)$PSK$SHA256
                                            • API String ID: 3142812517-1637006702
                                            • Opcode ID: 22b1fa60e36ba6287f1bc6f14d9eb96c9d991d63a256d015d457473488a5b0b7
                                            • Instruction ID: b9c842ed1178e04e1a41124feb896ca1434c688391bcbe4bbc85a9d6b5007a24
                                            • Opcode Fuzzy Hash: 22b1fa60e36ba6287f1bc6f14d9eb96c9d991d63a256d015d457473488a5b0b7
                                            • Instruction Fuzzy Hash: 3C116332F0EF4242F2B58A68A4B81755662BB47340F050136DD4DB2BA78EFFE9418608
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_snprintf
                                            • String ID: DSS$IDEA(128)$SHA256
                                            • API String ID: 3142812517-3841199953
                                            • Opcode ID: bcd508023703d1cfa3f383b34bb166623804abcfa86d47c02c90fb4ac799a4e1
                                            • Instruction ID: 110ef58d55ced920061c86cc1466358f8f5355d9473573bbee6b115edc1015af
                                            • Opcode Fuzzy Hash: bcd508023703d1cfa3f383b34bb166623804abcfa86d47c02c90fb4ac799a4e1
                                            • Instruction Fuzzy Hash: A4116332F0EF4242F2B58A68A4B81755662BB47340F050136DD4DB2BA78EFFE9418608
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_snprintf
                                            • String ID: GOST01$IDEA(128)$SHA256
                                            • API String ID: 3142812517-4064199452
                                            • Opcode ID: cfd0067d8a8ad8a67da8fc63cc408b603bb97ad56ff2d81728cab1d66831b990
                                            • Instruction ID: 22842d6ba464b4bbb9c9b9f9e6ba9ba113e14b3da93fc0706d158e14a210c02d
                                            • Opcode Fuzzy Hash: cfd0067d8a8ad8a67da8fc63cc408b603bb97ad56ff2d81728cab1d66831b990
                                            • Instruction Fuzzy Hash: CF117532F0EF4242F2B58A68A4A81755662FB47340F450136DD4DB3BA78EFFE941860C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_snprintf
                                            • String ID: GOST12$IDEA(128)$SHA256
                                            • API String ID: 3142812517-3478822438
                                            • Opcode ID: a0bac47b9c82c5a4c1ec5b48d2324b302cca4babee979be204a3a56fc339e4be
                                            • Instruction ID: 8b984ef5fe80ca236106535a863c3d5bb97a9b1e8a497243d74ac852e31b43ab
                                            • Opcode Fuzzy Hash: a0bac47b9c82c5a4c1ec5b48d2324b302cca4babee979be204a3a56fc339e4be
                                            • Instruction Fuzzy Hash: 90117532F0EF5242F2B58A68A4A81755662FB47340F050136DD4DB3BAB8EFFE941860C
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_snprintf
                                            • String ID: IDEA(128)$SHA256$SRP
                                            • API String ID: 3142812517-1647395391
                                            • Opcode ID: 4c6ebbec9975f5f847d62aac0176e09a990903033811db69cf6212be7734f895
                                            • Instruction ID: be2c27de9592e2751c8b7197d7bcb0a422db1ba4f8eb0fb32c0cd30d287488d1
                                            • Opcode Fuzzy Hash: 4c6ebbec9975f5f847d62aac0176e09a990903033811db69cf6212be7734f895
                                            • Instruction Fuzzy Hash: 12116632F0EF4242F2B58668A4B81755662BB47340F050136DD4DB2BA78EFFE9418608
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_snprintf
                                            • String ID: IDEA(128)$SHA256$any
                                            • API String ID: 3142812517-1956614738
                                            • Opcode ID: ba861a5591f4fecf2ff9ffa6c2c0a8a9f92a2a01709c69b466efccf13ece5890
                                            • Instruction ID: da733619ff789fa1741c0ddc3e53cf9b30effbdd2ae0f50a3f88b539893aba3a
                                            • Opcode Fuzzy Hash: ba861a5591f4fecf2ff9ffa6c2c0a8a9f92a2a01709c69b466efccf13ece5890
                                            • Instruction Fuzzy Hash: 5F116332F0EF4242F2B58A69A4A81755662BB47340F050136DD4DB2BA78EFFE9418608
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$X509_free
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 4102096802-2723262194
                                            • Opcode ID: 13b20eedb222f1f1f2e6d0bb6c12fea2797da574fd4ff134c3496baec6321aef
                                            • Instruction ID: 746566f3f0cc860b97ad36dfe4ca86709a828ab70f0a3e34cb59c3b1b65db3dc
                                            • Opcode Fuzzy Hash: 13b20eedb222f1f1f2e6d0bb6c12fea2797da574fd4ff134c3496baec6321aef
                                            • Instruction Fuzzy Hash: E3112731B0D24246EB249F25F8202AAA792FB847C4F484034EA4DD7B87DFBEE5508708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_new_nullL_sk_pushR_put_error
                                            • String ID: ..\s\ssl\ssl_cert.c
                                            • API String ID: 1176158178-349359282
                                            • Opcode ID: 1683a4ef7acdf72e624ee474a3665e466bd7fcd3fb21707e4e5ca1fa6b0056be
                                            • Instruction ID: 17e2f9a3a39a04f2c8f4a9c3a6ce7846e1c46541fbe7267d2d012fe5421e3f99
                                            • Opcode Fuzzy Hash: 1683a4ef7acdf72e624ee474a3665e466bd7fcd3fb21707e4e5ca1fa6b0056be
                                            • Instruction Fuzzy Hash: CA119022B0A64183EB549F26E4202A973A6FF44B84F080531EF8CD7B97CF7ED5918708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1767461275-1080266419
                                            • Opcode ID: 9c69d3e6be98beb030fa5cf9360c523eb2394a07a3783dabf1ec6d20db28155b
                                            • Instruction ID: a887428d5369ea8fe97dfef0ab26a54c4283479587bb90b23f6626513fe83291
                                            • Opcode Fuzzy Hash: 9c69d3e6be98beb030fa5cf9360c523eb2394a07a3783dabf1ec6d20db28155b
                                            • Instruction Fuzzy Hash: 34118675F1A64686FB64DF61C8202A937A2FB80708F804034E60C93792DFBEE656CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: PrivateR_put_errorY_freed2i_
                                            • String ID: ..\s\ssl\ssl_rsa.c
                                            • API String ID: 107863293-2723262194
                                            • Opcode ID: 6d9da762f28e668d6c441ad52502f2a15de4d5c06cecd3da551d32028c256582
                                            • Instruction ID: 6fe778a77194bb468fb530a16ae302b39ae640fdda9f69e4f9c5395ce7327a6c
                                            • Opcode Fuzzy Hash: 6d9da762f28e668d6c441ad52502f2a15de4d5c06cecd3da551d32028c256582
                                            • Instruction Fuzzy Hash: F7F0F922B0968542E700DF65F5501ADA392EF887C8F444030EB4C97B47DFBDD5508B08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$L_sk_freeL_sk_new_nullstrchrstrncmp
                                            • String ID: ..\s\ssl\d1_srtp.c$H
                                            • API String ID: 767303460-1001428523
                                            • Opcode ID: 337a7746ba5fd16e49325b5f725d95dd83121c91240e621c8da534d01108f6f7
                                            • Instruction ID: f3cd2b4441688797e3d398b94c5cb94d06e2e46956a09006bb5a9458276796bf
                                            • Opcode Fuzzy Hash: 337a7746ba5fd16e49325b5f725d95dd83121c91240e621c8da534d01108f6f7
                                            • Instruction Fuzzy Hash: 5DF0BB11F0B16685E698E75598116E51792AF04784F114031ED0CD3743ED7EE6578708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: memcpy
                                            • String ID: ..\s\ssl\statem\statem_lib.c$CLIENT_RANDOM
                                            • API String ID: 3510742995-484036895
                                            • Opcode ID: 07bb41f7ac5c7284c2c90cd0b8b9988f74b8d342a1ab349fb886773854449c43
                                            • Instruction ID: 35e3f991c9543a26f21986395693950cec023e70301ec494d5016359e9773c84
                                            • Opcode Fuzzy Hash: 07bb41f7ac5c7284c2c90cd0b8b9988f74b8d342a1ab349fb886773854449c43
                                            • Instruction Fuzzy Hash: 94519132B0674186EB90CB55D4643A877A2EB45BC8F184032EF4CA7796DF7EE485C315
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_free$L_sk_numL_sk_value
                                            • String ID:
                                            • API String ID: 4251522676-0
                                            • Opcode ID: f88cd81b8b2f884d54fda55d39006d2209b12edd05a205fd35b6b38ae48398b8
                                            • Instruction ID: d698925d8877fb9baa93f4f20553988d7abe41b63b5a5472db53043442b90d1b
                                            • Opcode Fuzzy Hash: f88cd81b8b2f884d54fda55d39006d2209b12edd05a205fd35b6b38ae48398b8
                                            • Instruction Fuzzy Hash: DD21CB12B0E64286F610AF25942017D76A2AF85B90F144433EE8DD3797DFBED5928708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_free$F_parse_listL_sk_new_null
                                            • String ID:
                                            • API String ID: 4265814531-0
                                            • Opcode ID: 7df82fb949e12bf4a216ac0d1243a055229da8c8e7b3ff2f6a825a281c0e489e
                                            • Instruction ID: 04ed4172433873dce53aba029e3226983e524286dca69879eba72d9da4eb25e4
                                            • Opcode Fuzzy Hash: 7df82fb949e12bf4a216ac0d1243a055229da8c8e7b3ff2f6a825a281c0e489e
                                            • Instruction Fuzzy Hash: 2C017121B0AB5281E6619B15F4202696361AF84B80F484031EF8CE3B9BDE7FD8918708
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: X_free
                                            • String ID:
                                            • API String ID: 2268491255-0
                                            • Opcode ID: 0501fa589575d6f3eaf730ced008f5909f2c3022fc05dda30cca060b699d4e5a
                                            • Instruction ID: 4acde41f94d2fa7e44ab16e4440bbb8b06239e9db0f6a6ada610ee272a9054b1
                                            • Opcode Fuzzy Hash: 0501fa589575d6f3eaf730ced008f5909f2c3022fc05dda30cca060b699d4e5a
                                            • Instruction Fuzzy Hash: 00F0CD62B0A74140EB90AF61D4913BC6355EF80B44F080035EF0C9B787CE69D490832D
                                            APIs
                                            • OPENSSL_sk_dup.LIBCRYPTO-1_1(00000000,00007FFDA3450C4A), ref: 00007FFDA34516B9
                                            • OPENSSL_sk_free.LIBCRYPTO-1_1(00000000,00007FFDA3450C4A), ref: 00007FFDA34516D4
                                            • OPENSSL_sk_set_cmp_func.LIBCRYPTO-1_1(00000000,00007FFDA3450C4A), ref: 00007FFDA34516E6
                                            • OPENSSL_sk_sort.LIBCRYPTO-1_1(00000000,00007FFDA3450C4A), ref: 00007FFDA34516EE
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_dupL_sk_freeL_sk_set_cmp_funcL_sk_sort
                                            • String ID:
                                            • API String ID: 1312970346-0
                                            • Opcode ID: 1f93946a7fdee477b04f09b1077695c938391180a9d071c085a2328c569291d2
                                            • Instruction ID: 61456e8a23d577fe89e780960f4219b7da9dce99a0355c2aa8a33dc3bf045b8b
                                            • Opcode Fuzzy Hash: 1f93946a7fdee477b04f09b1077695c938391180a9d071c085a2328c569291d2
                                            • Instruction Fuzzy Hash: 12F08222F0E60582EA65A726F1A13BC53529F88BC4F445031FE0D9B79BEDADD4914309
                                            APIs
                                            • memcpy.VCRUNTIME140 ref: 00007FFDA34828D7
                                              • Part of subcall function 00007FFDA3431267: EVP_CIPHER_CTX_cipher.LIBCRYPTO-1_1 ref: 00007FFDA3481496
                                              • Part of subcall function 00007FFDA3431267: EVP_CIPHER_flags.LIBCRYPTO-1_1 ref: 00007FFDA348149E
                                              • Part of subcall function 00007FFDA3431267: EVP_MD_CTX_md.LIBCRYPTO-1_1 ref: 00007FFDA34814B0
                                              • Part of subcall function 00007FFDA3431267: EVP_MD_size.LIBCRYPTO-1_1 ref: 00007FFDA34814B8
                                              • Part of subcall function 00007FFDA3431267: EVP_CIPHER_CTX_cipher.LIBCRYPTO-1_1 ref: 00007FFDA34814D1
                                              • Part of subcall function 00007FFDA3431267: EVP_CIPHER_flags.LIBCRYPTO-1_1 ref: 00007FFDA34814D9
                                              • Part of subcall function 00007FFDA3431267: EVP_CIPHER_CTX_block_size.LIBCRYPTO-1_1 ref: 00007FFDA34814EF
                                              • Part of subcall function 00007FFDA3431267: BIO_ctrl.LIBCRYPTO-1_1 ref: 00007FFDA348156D
                                            • BIO_ctrl.LIBCRYPTO-1_1 ref: 00007FFDA3482A07
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlR_flagsX_cipher$D_sizeX_block_sizeX_mdmemcpy
                                            • String ID: ..\s\ssl\statem\statem_dtls.c
                                            • API String ID: 1483294773-3140652063
                                            • Opcode ID: 204412abf80564a97c1fafa206ce13a068008e0f88b764c6312e434c6826633e
                                            • Instruction ID: 06b154690ef9cf7434d4db8f64f558b382f919d367a29f0aff332e0391180d1b
                                            • Opcode Fuzzy Hash: 204412abf80564a97c1fafa206ce13a068008e0f88b764c6312e434c6826633e
                                            • Instruction Fuzzy Hash: 44619A32305B8492D794EB16E5907AE77A9FB88B80F114136EF9C83752CF7AD460C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrl
                                            • String ID: ..\s\ssl\d1_lib.c
                                            • API String ID: 3605655398-490761327
                                            • Opcode ID: 4fb5c8f4a442cd5c47344fcfb48cd2715ef5b855b47c975e52132fa561e49fef
                                            • Instruction ID: 1d138456fc17258fcfee4f06649a8dce387f2b93c4ef9b2860594cc72efb32ef
                                            • Opcode Fuzzy Hash: 4fb5c8f4a442cd5c47344fcfb48cd2715ef5b855b47c975e52132fa561e49fef
                                            • Instruction Fuzzy Hash: 5C518F32B0668B86E79CCB15D1943FD37A2FB85B84F544131DA2D977A2CF7E90518B04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_ctrlmemcpy
                                            • String ID: ..\s\ssl\statem\statem_dtls.c
                                            • API String ID: 2266715306-3140652063
                                            • Opcode ID: e4d82e34aee3a298b4fce358bf4607c529f4486acfee45f1fbe5eab23aec6226
                                            • Instruction ID: 9cdfa43229ccfab8fab739a8f5591de11c164edeeb215f8e0a73fa8c3ce14324
                                            • Opcode Fuzzy Hash: e4d82e34aee3a298b4fce358bf4607c529f4486acfee45f1fbe5eab23aec6226
                                            • Instruction Fuzzy Hash: 60513736305BC496D7989F25E5907AEB7A9FB88B80F104026EF9C83756DF79E0A4C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_sk_numL_sk_value
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 557030205-592572767
                                            • Opcode ID: 7f95b965ad8b109ce67aa820121db860145efe4b2b9880573eb570dee2adb987
                                            • Instruction ID: dc9d4076e79ec2cb6772a458da2959afb1162a2ca62e280972c9afd432a55cb9
                                            • Opcode Fuzzy Hash: 7f95b965ad8b109ce67aa820121db860145efe4b2b9880573eb570dee2adb987
                                            • Instruction Fuzzy Hash: FD419621B0DB4245F7249B12E56127EA396AF85BC0F140030DE8CE7B9BDFBEE5558B08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: ErrorLastO_write
                                            • String ID: ..\s\ssl\record\rec_layer_s3.c
                                            • API String ID: 186964608-2209325370
                                            • Opcode ID: 8d41160d5e821a9b59c27cfcbeb813b5333318ab4bb8ac73822785134f644a65
                                            • Instruction ID: 361499a7205f43141547c8b7013e4277ddd5ea79ef7a0e70ee86b17958aa3f62
                                            • Opcode Fuzzy Hash: 8d41160d5e821a9b59c27cfcbeb813b5333318ab4bb8ac73822785134f644a65
                                            • Instruction Fuzzy Hash: CF41BF32B0AF89C2EB288F15D4542B977A6FB45B88F144231DA4C93B96DFBEE4518704
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ..\s\ssl\statem\extensions_clnt.c
                                            • API String ID: 0-592572767
                                            • Opcode ID: 58218e73376a22996f52c87b212d3caa0290f253a5f46efd9b6d072cc0b82ad2
                                            • Instruction ID: ac0448f0ae8a70fc060c0f1118003b469612f63ddc1752cb67506ec4016d36e7
                                            • Opcode Fuzzy Hash: 58218e73376a22996f52c87b212d3caa0290f253a5f46efd9b6d072cc0b82ad2
                                            • Instruction Fuzzy Hash: 9A31B262B0EA4682FB508B95E4603BD7392EF84794F040131DA5D97BD7DFEED9508B04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: L_cleansememcpy
                                            • String ID: traffic upd
                                            • API String ID: 2817969487-79366657
                                            • Opcode ID: f8617069f4cd0e815da06fd2992a78c95339bda7289e02c4423e570d17b17890
                                            • Instruction ID: f93b5bcea7ed16793f372425b91793c057e2641817fda218f3e8b8d8bc408b8a
                                            • Opcode Fuzzy Hash: f8617069f4cd0e815da06fd2992a78c95339bda7289e02c4423e570d17b17890
                                            • Instruction Fuzzy Hash: BB31C42270AB8586E620EB12F4113AAB791FB48784F400035EF8EA7787DF7DE555C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_flagsO_set_flags
                                            • String ID: ..\s\ssl\statem\statem_clnt.c
                                            • API String ID: 3946675294-1507966698
                                            • Opcode ID: d30551647313214b532e7e2b796882818c474d38519b687cef5c0ab25d58397c
                                            • Instruction ID: 74b152041565c9d7ae47a136c8b1f53a8e44c4d5049b888b50778d0efeda90f1
                                            • Opcode Fuzzy Hash: d30551647313214b532e7e2b796882818c474d38519b687cef5c0ab25d58397c
                                            • Instruction Fuzzy Hash: 4131DB72B0A64185EB64DF19E4A03B927A2EB49B88F184130DA4DD7797CF7ED491C708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Time$System$File
                                            • String ID: gfff
                                            • API String ID: 2838179519-1553575800
                                            • Opcode ID: 5bab4889fdff038a34dd7d6efd02d934e11c3433e8613633f5b88581a3d60216
                                            • Instruction ID: 1b328c8ba7206ba761c5a27d91202f1ed9f54957f862f9fe74ae4684dd14f2df
                                            • Opcode Fuzzy Hash: 5bab4889fdff038a34dd7d6efd02d934e11c3433e8613633f5b88581a3d60216
                                            • Instruction Fuzzy Hash: E621E672B0964B86EB988F29E4603797BE1EB88BC8F448035DA4DD776ADE7DD0408700
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: D_bytes_time64
                                            • String ID: DOWNGRD
                                            • API String ID: 3543108242-2922851170
                                            • Opcode ID: badda77ca74e05cbb1b9a1913239d2957b81495fa8a0d3fb60bfa0f44542addb
                                            • Instruction ID: d65020198b292a6e18a9caee862001f0a1ba019bb9a99b1e606eb26d02e39fc3
                                            • Opcode Fuzzy Hash: badda77ca74e05cbb1b9a1913239d2957b81495fa8a0d3fb60bfa0f44542addb
                                            • Instruction Fuzzy Hash: ED21D832F0968243E75C9729AA7107D7293EB94340F544038DB1BD7783DE6EE8A0C304
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_flagsO_set_flags
                                            • String ID: ..\s\ssl\statem\statem_srvr.c
                                            • API String ID: 3946675294-348624464
                                            • Opcode ID: c87b56faf171a4358b43028e3704c239902ffb2910c5da52c190f6c6e0bcb5c0
                                            • Instruction ID: 4a70008f691bd2638f75f52d31bdec64a80b278ba6d1c0b1c707c30f986b0963
                                            • Opcode Fuzzy Hash: c87b56faf171a4358b43028e3704c239902ffb2910c5da52c190f6c6e0bcb5c0
                                            • Instruction Fuzzy Hash: 7021AE22B0A6828BE7909B15D4A53BC3B92EB88748F544035EA8DD3793CFFED545C704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ($..\s\ssl\ssl_lib.c
                                            • API String ID: 1767461275-1617307452
                                            • Opcode ID: 7d1b406a4ab2cc278b0194956e2ea246e9ca3ab2704f59a0278e6af02dd3de85
                                            • Instruction ID: 760c1e219e08ef7874623708074ad776b9e1333dde0439882df6fa0cb7ac5e8e
                                            • Opcode Fuzzy Hash: 7d1b406a4ab2cc278b0194956e2ea246e9ca3ab2704f59a0278e6af02dd3de85
                                            • Instruction Fuzzy Hash: A721D271B0AB41C5E3609F54E0103A972A2FB49798F680236EB4C977D6CFBED9418B09
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: C_get_current_jobR_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 4281227279-1080266419
                                            • Opcode ID: 8f083c8a184d4fd3118b2df8a8c15317da89aba9ac76828985e5f07a173d9a40
                                            • Instruction ID: 8696864ae4816645c296efe9f8eea0e1e6664968c8d7220bc7c5cb258de60862
                                            • Opcode Fuzzy Hash: 8f083c8a184d4fd3118b2df8a8c15317da89aba9ac76828985e5f07a173d9a40
                                            • Instruction Fuzzy Hash: 3621C122F1974682E750DB25E5512AD3392EF88B84F580231FA49A3797EFBDE4818A04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_snprintf
                                            • String ID: IDEA(128)$SHA256
                                            • API String ID: 3142812517-2727354722
                                            • Opcode ID: d9460424121df0b78aea2e3d6fd0e1f3df40830b56acf255451b65b00fea00d8
                                            • Instruction ID: 10a88fe703511b4d7c04995206ade39f1c8882ebdb408019054188e5ea12e8eb
                                            • Opcode Fuzzy Hash: d9460424121df0b78aea2e3d6fd0e1f3df40830b56acf255451b65b00fea00d8
                                            • Instruction Fuzzy Hash: 40117532F0EF5242F2B58A69A4A81755662BB47340F050136DD4DB3BA78EFFE9418648
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: -
                                            • API String ID: 0-2547889144
                                            • Opcode ID: 50f535b0f6b9e0d1da5e18111bc2edabd67c184415786a1ceb57d463008e140f
                                            • Instruction ID: 5edfb7ee7d29e489bb49247b304fd607aaae5cce45bc319bfb88fd1ed461b010
                                            • Opcode Fuzzy Hash: 50f535b0f6b9e0d1da5e18111bc2edabd67c184415786a1ceb57d463008e140f
                                            • Instruction Fuzzy Hash: 05116372F095418AFB908F1AE06437C27A2EB85B58F554135CB0C8B38BDF7ED4958B08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error$R_add_error_data$conf_ssl_get_cmdconf_ssl_name_find
                                            • String ID: !$..\s\ssl\ssl_mcnf.c
                                            • API String ID: 1136227658-1677383339
                                            • Opcode ID: 7024b6112d44a401bdb0f3d32813959a5e408be8cf8b68b193383ec4148f1dbf
                                            • Instruction ID: 49504dbed1d9fa12553f1544e4de85c751130543ac76c68d9ffd049cffee5c30
                                            • Opcode Fuzzy Hash: 7024b6112d44a401bdb0f3d32813959a5e408be8cf8b68b193383ec4148f1dbf
                                            • Instruction Fuzzy Hash: 43014923F0B24182F7249A91A8106BA1252AB407D4F00C035FE0CD7BC3DE7DD9928708
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1767461275-1080266419
                                            • Opcode ID: 653bc97def7ddd28f1a173005cbf812f26c3eea3de9f75b4993d309b3b478db1
                                            • Instruction ID: bd7a1b9bd924d2605a8826f2db70bbff9d71e512ab1a6d68ad8136da3f317d94
                                            • Opcode Fuzzy Hash: 653bc97def7ddd28f1a173005cbf812f26c3eea3de9f75b4993d309b3b478db1
                                            • Instruction Fuzzy Hash: FA11CE29F0A24282F750AB61D8213F92297AF40304F440031D90CE77C7DFBEEA91C318
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1767461275-1080266419
                                            • Opcode ID: 313acef978bffea86714e02ae65a3a584ea264f2087be210df51fc1ee6c682e6
                                            • Instruction ID: 8d69b7a6338a81c28810e52b89b7de66e80f38baac3588f9922df52380adbca1
                                            • Opcode Fuzzy Hash: 313acef978bffea86714e02ae65a3a584ea264f2087be210df51fc1ee6c682e6
                                            • Instruction Fuzzy Hash: 1A015E62F0A34586F7519B55D8143993692FB4074CF948134EA4CD77E2CFBED986CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1767461275-1080266419
                                            • Opcode ID: a3402959f9b8482732006edcbc1b967c4b4a5d664d34c2b69162fbf4fa25a2fd
                                            • Instruction ID: facbcd9646c4c039d70f7dadec8ad4e42c8a0b8065f3bdb4f35dd7a6a4765974
                                            • Opcode Fuzzy Hash: a3402959f9b8482732006edcbc1b967c4b4a5d664d34c2b69162fbf4fa25a2fd
                                            • Instruction Fuzzy Hash: 26015E72F0A38586F7519B55C8153993692FB40748F508134EA4C977E2CFBED996CB04
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: Y_get0_group
                                            • String ID: {
                                            • API String ID: 3268241200-4087598719
                                            • Opcode ID: e33d06e3be94e0a184dbb4d4c60d0bab2df72c9bf962c9d4d93606db3ef6c6e7
                                            • Instruction ID: ccdeb59c24c40ae6d777c3d48e8ede529c452e6c0222de41027703c8df02e8a2
                                            • Opcode Fuzzy Hash: e33d06e3be94e0a184dbb4d4c60d0bab2df72c9bf962c9d4d93606db3ef6c6e7
                                            • Instruction Fuzzy Hash: CDF0A921B0E542C6FB61EE50E0202BC6752BB80794F440532DE4DA7797DFFEE1458718
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_flagsO_set_flags
                                            • String ID: &
                                            • API String ID: 3946675294-1010288
                                            • Opcode ID: 2bef2fb19a2e1a261c318906132edc35b56a4ae7fdd66ccc087fa3284b20747d
                                            • Instruction ID: 19477429fa76df63647794cba0360cfff7631ab65bf7dc084a62b6ac6f589bf3
                                            • Opcode Fuzzy Hash: 2bef2fb19a2e1a261c318906132edc35b56a4ae7fdd66ccc087fa3284b20747d
                                            • Instruction Fuzzy Hash: 6CF09662B0964186FB50DB26E06537D2792EB85B48F194034CE4C8B78BDF7EC4918704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: O_clear_flagsO_set_flags
                                            • String ID: '
                                            • API String ID: 3946675294-1997036262
                                            • Opcode ID: a3c46faf9a164dc0ce3dd0952da6781b21ed937f7c556786078a3bdb919bd19a
                                            • Instruction ID: 259f89f4d2aacfa532223974ab13eac6e7e177a73f42161edab6589d7815d236
                                            • Opcode Fuzzy Hash: a3c46faf9a164dc0ce3dd0952da6781b21ed937f7c556786078a3bdb919bd19a
                                            • Instruction Fuzzy Hash: 3FF09662B0964186FB509B26E06137C2791EB85B48F154034CE4C8B7CBDF7EC4958704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_errormemcpy
                                            • String ID: ..\s\ssl\ssl_sess.c
                                            • API String ID: 1385177007-2868363209
                                            • Opcode ID: 30f9734ecd00a7bffa40890edf63c63ac05f31dd9d01e44b878c104969c93cc2
                                            • Instruction ID: 8177043b341a19b6770b545a61a3bcba21fcef4ed1932ef820f152fee43fad34
                                            • Opcode Fuzzy Hash: 30f9734ecd00a7bffa40890edf63c63ac05f31dd9d01e44b878c104969c93cc2
                                            • Instruction Fuzzy Hash: B2F0AE65F1609247EB606B9598157EC1751AF40340F800530E10D96783DFAE56568704
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: +$..\s\ssl\pqueue.c
                                            • API String ID: 1767461275-3697747608
                                            • Opcode ID: dbf9d5c89b16541b622dc419c562c68810710d0935cac74871ac38a3faf34fae
                                            • Instruction ID: a74c25bf29e3be97d80bcd9cb78ceb0a7dfd2c51d8de1f3189235a9d5c9b212d
                                            • Opcode Fuzzy Hash: dbf9d5c89b16541b622dc419c562c68810710d0935cac74871ac38a3faf34fae
                                            • Instruction Fuzzy Hash: 65F0A025B1B10786EB549B10D0255A97762EF40304F400031EA0CA3393EFBEF65ACB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_errormemcpy
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1385177007-1080266419
                                            • Opcode ID: 5fe9283d2c71ab4161b7334fd32eb3f44c3a3402327cdb9bd1134ce8e9508b8e
                                            • Instruction ID: b4ce1afabf2afdab48807c5d366b82956e2d282b6b67bac5f26c9608d79ac3ee
                                            • Opcode Fuzzy Hash: 5fe9283d2c71ab4161b7334fd32eb3f44c3a3402327cdb9bd1134ce8e9508b8e
                                            • Instruction Fuzzy Hash: FBE06561F1A15647E361A7A488217A93751FB40344F800030E10DE7783CEAFA65ACB08
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_errormemcpy
                                            • String ID: ..\s\ssl\ssl_lib.c
                                            • API String ID: 1385177007-1080266419
                                            • Opcode ID: 94ab37f8014b0f27dd2f749edd48aea2620e98c56777c17c97807f3485cf7c3f
                                            • Instruction ID: a0933741ec98414b5f2e584bb7c832d788c0e83d6b5a247e14d08df2d55536bb
                                            • Opcode Fuzzy Hash: 94ab37f8014b0f27dd2f749edd48aea2620e98c56777c17c97807f3485cf7c3f
                                            • Instruction Fuzzy Hash: CEE09261F161A647E760ABA4D42579C3791FB40344F804030F20C93783CEAFA6678B18
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.2125928314.00007FFDA3431000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FFDA3430000, based on PE: true
                                            • Associated: 00000002.00000002.2125906854.00007FFDA3430000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2125928314.00007FFDA34A4000.00000020.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126002450.00007FFDA34A6000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126034771.00007FFDA34C9000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126063083.00007FFDA34CD000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34CE000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34D4000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            • Associated: 00000002.00000002.2126087004.00007FFDA34DB000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_7ffda3430000_file.jbxd
                                            Similarity
                                            • API ID: R_put_error
                                            • String ID: ..\s\ssl\s3_lib.c$m
                                            • API String ID: 1767461275-297842231
                                            • Opcode ID: dabded245b1138d054d01c0e447c6de338ca7fe595687a8483ebc962513b1b14
                                            • Instruction ID: f5ef69f5e128be92ab34753a44c245e63112c9969d95df067779ebef0031e7ad
                                            • Opcode Fuzzy Hash: dabded245b1138d054d01c0e447c6de338ca7fe595687a8483ebc962513b1b14
                                            • Instruction Fuzzy Hash: C6D01226F0895597E321EF56F4101D96322F784354F450832EB4C527D6CF7EE5869B14