Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q3pEXxmWAD.exe

Overview

General Information

Sample name:Q3pEXxmWAD.exe
renamed because original name is a hash value
Original sample name:f468ae483026819d6977e2a5e34ea52a.exe
Analysis ID:1479908
MD5:f468ae483026819d6977e2a5e34ea52a
SHA1:bdcd08269c84863eace14dc54d64c6f0af41f332
SHA256:578778fa4d79588a14d0830d4e52dc55aead1ca8bf99c9672cbdaf6c7b58eb5c
Tags:64exetrojan
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Contains functionality to infect the boot sector
Detected Stratum mining protocol
Drops PE files to the startup folder
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found pyInstaller with non standard icon
Found strings related to Crypto-Mining
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Sample is not signed and drops a device driver
Stops critical windows services
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to enumerate running services
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Q3pEXxmWAD.exe (PID: 5004 cmdline: "C:\Users\user\Desktop\Q3pEXxmWAD.exe" MD5: F468AE483026819D6977E2A5E34EA52A)
    • Q3pEXxmWAD.exe (PID: 3144 cmdline: "C:\Users\user\Desktop\Q3pEXxmWAD.exe" MD5: F468AE483026819D6977E2A5E34EA52A)
      • cmd.exe (PID: 2804 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Blsvr.exe (PID: 1352 cmdline: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe MD5: 4781C53D9BB1CB237B653C687028203D)
          • conhost.exe (PID: 5664 cmdline: C:\Windows\System32\conhost.exe MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 940 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 6504 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 6388 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 4292 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 6772 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 760 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cmd.exe (PID: 3580 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 5672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 1988 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 3680 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 6164 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 6204 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • Q3pEXxmWAD.exe (PID: 6388 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe" MD5: F468AE483026819D6977E2A5E34EA52A)
    • Q3pEXxmWAD.exe (PID: 2716 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe" MD5: F468AE483026819D6977E2A5E34EA52A)
      • cmd.exe (PID: 7148 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 2612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Blsvr.exe (PID: 6004 cmdline: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe MD5: 4781C53D9BB1CB237B653C687028203D)
  • cmd.exe (PID: 2124 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 2804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 1864 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 1968 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 1628 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 2820 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 2072 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cmd.exe (PID: 6160 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 4676 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 5392 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 4092 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 2884 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 2860 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • svchost.exe (PID: 1548 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
      • 0x4cb268:$a1: mining.set_target
      • 0x4c6a48:$a2: XMRIG_HOSTNAME
      • 0x4c8540:$a3: Usage: xmrig [OPTIONS]
      • 0x4c6a20:$a4: XMRIG_VERSION
      C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmpMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
      • 0x4d1241:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
      C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmpMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
      • 0x4d17a0:$s1: %s/%s (Windows NT %lu.%lu
      • 0x4d1fc8:$s3: \\.\WinRing0_
      • 0x4ca4c8:$s4: pool_wallet
      • 0x4c62d0:$s5: cryptonight
      • 0x4c62e0:$s5: cryptonight
      • 0x4c62f0:$s5: cryptonight
      • 0x4c6300:$s5: cryptonight
      • 0x4c6318:$s5: cryptonight
      • 0x4c6328:$s5: cryptonight
      • 0x4c6338:$s5: cryptonight
      • 0x4c6350:$s5: cryptonight
      • 0x4c6360:$s5: cryptonight
      • 0x4c6378:$s5: cryptonight
      • 0x4c6390:$s5: cryptonight
      • 0x4c63a0:$s5: cryptonight
      • 0x4c63b0:$s5: cryptonight
      • 0x4c63c0:$s5: cryptonight
      • 0x4c63d8:$s5: cryptonight
      • 0x4c63f0:$s5: cryptonight
      • 0x4c6400:$s5: cryptonight
      • 0x4c6410:$s5: cryptonight
      SourceRuleDescriptionAuthorStrings
      00000011.00000002.3255036623.000001F6A91A6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000011.00000002.3255036623.000001F6A91C1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpMacOS_Cryptominer_Xmrig_241780a1unknownunknown
            • 0x4ceb68:$a1: mining.set_target
            • 0x4ca348:$a2: XMRIG_HOSTNAME
            • 0x4cbe40:$a3: Usage: xmrig [OPTIONS]
            • 0x4ca320:$a4: XMRIG_VERSION
            00000019.00000002.2223523433.00007FF66787B000.00000004.00000001.01000000.0000002C.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              Click to see the 4 entries
              SourceRuleDescriptionAuthorStrings
              25.2.Blsvr.exe.7ff667860000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                25.2.Blsvr.exe.7ff667860000.0.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
                • 0x4e8968:$a1: mining.set_target
                • 0x4e4148:$a2: XMRIG_HOSTNAME
                • 0x4e5c40:$a3: Usage: xmrig [OPTIONS]
                • 0x4e4120:$a4: XMRIG_VERSION
                25.2.Blsvr.exe.7ff667860000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
                • 0x4ee941:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
                25.2.Blsvr.exe.7ff667860000.0.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
                • 0x4eeea0:$s1: %s/%s (Windows NT %lu.%lu
                • 0x4ef6c8:$s3: \\.\WinRing0_
                • 0x4e7bc8:$s4: pool_wallet
                • 0x4e39d0:$s5: cryptonight
                • 0x4e39e0:$s5: cryptonight
                • 0x4e39f0:$s5: cryptonight
                • 0x4e3a00:$s5: cryptonight
                • 0x4e3a18:$s5: cryptonight
                • 0x4e3a28:$s5: cryptonight
                • 0x4e3a38:$s5: cryptonight
                • 0x4e3a50:$s5: cryptonight
                • 0x4e3a60:$s5: cryptonight
                • 0x4e3a78:$s5: cryptonight
                • 0x4e3a90:$s5: cryptonight
                • 0x4e3aa0:$s5: cryptonight
                • 0x4e3ab0:$s5: cryptonight
                • 0x4e3ac0:$s5: cryptonight
                • 0x4e3ad8:$s5: cryptonight
                • 0x4e3af0:$s5: cryptonight
                • 0x4e3b00:$s5: cryptonight
                • 0x4e3b10:$s5: cryptonight
                25.2.Blsvr.exe.7ff66787e900.1.raw.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                  Click to see the 19 entries

                  Operating System Destruction

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 940, ProcessName: cmd.exe

                  System Summary

                  barindex
                  Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\Q3pEXxmWAD.exe, ProcessId: 3144, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 1548, ProcessName: svchost.exe
                  No Snort rule has matched
                  Timestamp:2024-07-24T10:58:06.272680+0200
                  SID:2047928
                  Source Port:55678
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Crypto Currency Mining Activity Detected
                  Timestamp:2024-07-24T10:57:57.586154+0200
                  SID:2826930
                  Source Port:49705
                  Destination Port:3333
                  Protocol:TCP
                  Classtype:Crypto Currency Mining Activity Detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: pool.supportxmr.comVirustotal: Detection: 8%Perma Link
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeReversingLabs: Detection: 79%
                  Source: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeReversingLabs: Detection: 79%
                  Source: Q3pEXxmWAD.exeReversingLabs: Detection: 36%
                  Source: Q3pEXxmWAD.exeVirustotal: Detection: 44%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D8A60 CRYPTO_zalloc,CRYPTO_free,2_2_00007FF8A92D8A60
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2608 CRYPTO_malloc,ERR_new,ERR_set_debug,memcpy,memcpy,memcmp,memcmp,memcmp,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_clear_free,2_2_00007FF8A92D2608
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D13A2 memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,2_2_00007FF8A92D13A2
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1A0F ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_CIPHER_CTX_get0_cipher,EVP_CIPHER_get_flags,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_get0_md,EVP_MD_get_size,CRYPTO_memcmp,ERR_set_mark,ERR_clear_last_mark,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_pop_to_mark,ERR_clear_last_mark,ERR_new,ERR_set_debug,EVP_MD_CTX_get0_md,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,strncmp,strncmp,strncmp,strncmp,strncmp,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,2_2_00007FF8A92D1A0F
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1CC1 EVP_MD_get_size,ERR_new,ERR_set_debug,RAND_bytes_ex,ERR_new,ERR_set_debug,_time64,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D1CC1
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D218F ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,CRYPTO_free,ERR_new,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,2_2_00007FF8A92D218F
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E4960 OPENSSL_sk_num,X509_STORE_CTX_new_ex,ERR_new,ERR_set_debug,ERR_set_error,OPENSSL_sk_value,X509_STORE_CTX_init,ERR_new,ERR_set_debug,ERR_set_error,X509_STORE_CTX_free,X509_STORE_CTX_set_flags,CRYPTO_THREAD_run_once,X509_STORE_CTX_set_ex_data,OPENSSL_sk_num,X509_STORE_CTX_set0_dane,X509_STORE_CTX_set_default,X509_VERIFY_PARAM_set1,X509_STORE_CTX_set_verify_cb,X509_verify_cert,X509_STORE_CTX_get_error,OPENSSL_sk_pop_free,X509_STORE_CTX_get0_chain,X509_STORE_CTX_get1_chain,ERR_new,ERR_set_debug,ERR_set_error,X509_VERIFY_PARAM_move_peername,X509_STORE_CTX_free,2_2_00007FF8A92E4960
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1401 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D1401
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1F2D ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_strdup,2_2_00007FF8A92D1F2D
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93289B0 CRYPTO_free,CRYPTO_strndup,2_2_00007FF8A93289B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9318C60 CRYPTO_free,2_2_00007FF8A9318C60
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D4C00 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D4C00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931EC10 CRYPTO_free,2_2_00007FF8A931EC10
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9312C30 SRP_Calc_u_ex,BN_num_bits,CRYPTO_malloc,ERR_new,ERR_set_debug,BN_bn2bin,BN_clear_free,BN_clear_free,2_2_00007FF8A9312C30
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92FEC90 CRYPTO_THREAD_write_lock,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,2_2_00007FF8A92FEC90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1154 CRYPTO_free,ERR_new,ERR_set_debug,2_2_00007FF8A92D1154
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D17DF ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D17DF
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1CA8 CRYPTO_strdup,CRYPTO_free,2_2_00007FF8A92D1CA8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2383 CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D2383
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2432 CRYPTO_zalloc,CRYPTO_zalloc,OBJ_nid2sn,EVP_get_digestbyname,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D2432
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A934AB20 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_strndup,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_memdup,OPENSSL_cleanse,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A934AB20
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D4B40 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D4B40
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92EABB0 CRYPTO_free,CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,2_2_00007FF8A92EABB0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9342BC0 CRYPTO_memcmp,2_2_00007FF8A9342BC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1492 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D1492
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1212 EVP_PKEY_free,EVP_PKEY_free,CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_clear_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,memset,2_2_00007FF8A92D1212
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D26C6 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_strdup,2_2_00007FF8A92D26C6
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931EBB0 CRYPTO_free,2_2_00007FF8A931EBB0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9334BB0 BN_num_bits,BN_bn2bin,CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A9334BB0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9318E50 CRYPTO_malloc,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,2_2_00007FF8A9318E50
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D22E8 CRYPTO_malloc,CONF_parse_list,CRYPTO_memdup,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D22E8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92EEE43 CRYPTO_free,2_2_00007FF8A92EEE43
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1370 ERR_new,ERR_set_debug,CRYPTO_THREAD_read_lock,CRYPTO_THREAD_unlock,ERR_new,ERR_set_debug,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,memset,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D1370
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A934AED0 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_malloc,ERR_new,ERR_set_debug,EVP_PKEY_CTX_new_from_pkey,ERR_new,ERR_set_debug,EVP_PKEY_decrypt_init,EVP_PKEY_CTX_set_rsa_padding,OSSL_PARAM_construct_uint,OSSL_PARAM_construct_end,EVP_PKEY_CTX_set_params,EVP_PKEY_decrypt,OPENSSL_cleanse,ERR_new,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,EVP_PKEY_CTX_free,2_2_00007FF8A934AED0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D258B ERR_new,ERR_set_debug,CRYPTO_free,BIO_clear_flags,BIO_set_flags,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,OPENSSL_cleanse,2_2_00007FF8A92D258B
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1A05 ERR_new,ERR_set_debug,ERR_set_error,ASN1_item_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,memcpy,_time64,X509_free,memcpy,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,ASN1_item_free,2_2_00007FF8A92D1A05
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9330D60 ERR_new,ERR_set_debug,CRYPTO_clear_free,2_2_00007FF8A9330D60
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9318D10 OPENSSL_cleanse,CRYPTO_free,2_2_00007FF8A9318D10
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E4D50 CRYPTO_get_ex_new_index,2_2_00007FF8A92E4D50
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D14CE CRYPTO_free,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,2_2_00007FF8A92D14CE
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E4DB0 i2d_X509_NAME,i2d_X509_NAME,memcmp,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92E4DB0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D17E9 ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,memcmp,ERR_new,CRYPTO_memdup,ERR_new,ERR_new,ERR_set_debug,2_2_00007FF8A92D17E9
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1771 CRYPTO_free,2_2_00007FF8A92D1771
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9336D90 CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,2_2_00007FF8A9336D90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1186 EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D1186
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92ED040 CRYPTO_free,CRYPTO_free,CRYPTO_free_ex_data,OPENSSL_LH_free,X509_STORE_free,CTLOG_STORE_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_secure_free,EVP_MD_get0_provider,EVP_MD_free,EVP_MD_get0_provider,EVP_MD_free,EVP_CIPHER_get0_provider,EVP_CIPHER_free,EVP_MD_get0_provider,EVP_MD_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92ED040
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93190C0 CRYPTO_malloc,ERR_new,ERR_set_debug,2_2_00007FF8A93190C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1A32 CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,2_2_00007FF8A92D1A32
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1181 _time64,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,2_2_00007FF8A92D1181
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9342F40 CRYPTO_free,CRYPTO_memdup,2_2_00007FF8A9342F40
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1460 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,BIO_snprintf,2_2_00007FF8A92D1460
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1811 CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,2_2_00007FF8A92D1811
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2379 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D2379
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D17F8 EVP_MD_CTX_new,EVP_PKEY_new_raw_private_key_ex,EVP_DigestSignInit_ex,EVP_DigestSign,EVP_MD_CTX_free,EVP_PKEY_free,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,_time64,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_free,EVP_PKEY_free,ERR_new,ERR_set_debug,EVP_MD_CTX_free,EVP_PKEY_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D17F8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D4FE0 CRYPTO_free,2_2_00007FF8A92D4FE0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D6233 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,BIO_set_init,BIO_set_data,BIO_clear_flags,2_2_00007FF8A92D6233
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D138E CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D138E
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D23FB CRYPTO_free,CRYPTO_memdup,2_2_00007FF8A92D23FB
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F6290 ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,EVP_MD_get_size,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_malloc,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,memcpy,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_insert,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,EVP_PKEY_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,d2i_X509,X509_get0_pubkey,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,X509_free,OPENSSL_sk_new_null,OPENSSL_sk_push,ERR_new,ERR_set_debug,ERR_set_error,X509_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92F6290
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E62F0 CRYPTO_THREAD_run_once,2_2_00007FF8A92E62F0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1366 CRYPTO_malloc,EVP_PKEY_set_type,EVP_PKEY_CTX_new_from_pkey,EVP_PKEY_CTX_free,ERR_pop_to_mark,CRYPTO_free,EVP_PKEY_free,2_2_00007FF8A92D1366
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D4130 CRYPTO_free,2_2_00007FF8A92D4130
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D150A OPENSSL_sk_num,OPENSSL_sk_num,OPENSSL_sk_new_reserve,ERR_new,ERR_set_debug,ERR_set_error,OPENSSL_sk_value,X509_VERIFY_PARAM_get_depth,CRYPTO_dup_ex_data,X509_VERIFY_PARAM_inherit,OPENSSL_sk_dup,OPENSSL_sk_dup,2_2_00007FF8A92D150A
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931E160 CRYPTO_free,2_2_00007FF8A931E160
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2694 CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,2_2_00007FF8A92D2694
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1C58 CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,2_2_00007FF8A92D1C58
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D13D9 OPENSSL_sk_new_null,ERR_new,ERR_set_debug,X509_new_ex,d2i_X509,CRYPTO_free,OPENSSL_sk_push,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_new,ERR_set_debug,X509_free,OPENSSL_sk_pop_free,2_2_00007FF8A92D13D9
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931E1D0 CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A931E1D0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9336180 EVP_CIPHER_CTX_free,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,2_2_00007FF8A9336180
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9346190 CRYPTO_memcmp,2_2_00007FF8A9346190
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1CF3 CRYPTO_malloc,memset,memcpy,memcpy,CRYPTO_clear_free,CRYPTO_clear_free,CRYPTO_clear_free,CRYPTO_clear_free,OPENSSL_cleanse,2_2_00007FF8A92D1CF3
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D15E1 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,memcpy,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D15E1
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9348450 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcmp,ERR_new,ERR_new,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,ERR_new,ERR_set_debug,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,OPENSSL_sk_free,OPENSSL_sk_dup,OPENSSL_sk_free,OPENSSL_sk_dup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_free,ERR_new,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A9348450
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1627 EVP_MD_CTX_new,ERR_new,ERR_set_debug,ERR_new,EVP_MD_get0_name,EVP_DigestSignInit_ex,ERR_new,ERR_set_debug,EVP_PKEY_CTX_set_rsa_padding,EVP_PKEY_CTX_set_rsa_pss_saltlen,ERR_new,EVP_DigestSignUpdate,EVP_DigestSignFinal,CRYPTO_malloc,EVP_DigestSignFinal,ERR_new,ERR_new,EVP_DigestSign,ERR_new,CRYPTO_malloc,EVP_DigestSign,BUF_reverse,ERR_new,CRYPTO_free,EVP_MD_CTX_free,ERR_new,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,EVP_MD_CTX_free,2_2_00007FF8A92D1627
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D6460 BIO_get_data,BIO_get_shutdown,BIO_get_init,BIO_clear_flags,BIO_set_init,CRYPTO_free,2_2_00007FF8A92D6460
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D18B6 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D18B6
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DE4A0 CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92DE4A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92FE4F0 CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,2_2_00007FF8A92FE4F0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D4330 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D4330
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1F41 CRYPTO_malloc,ERR_new,ERR_set_debug,2_2_00007FF8A92D1F41
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A933C370 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,memcpy,EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A933C370
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F2360 memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,2_2_00007FF8A92F2360
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D19DD BN_copy,BN_free,BN_dup,BN_copy,BN_free,BN_dup,BN_copy,BN_free,BN_dup,BN_copy,BN_free,CRYPTO_free,CRYPTO_strdup,2_2_00007FF8A92D19DD
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9328330 CRYPTO_memcmp,2_2_00007FF8A9328330
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92EC3A0 CRYPTO_free,CRYPTO_memdup,2_2_00007FF8A92EC3A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1F5A CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,2_2_00007FF8A92D1F5A
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93343A0 ERR_new,ERR_set_debug,memset,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memdup,CRYPTO_strdup,CRYPTO_free,CRYPTO_free,ERR_new,ERR_new,ERR_set_debug,OPENSSL_cleanse,OPENSSL_cleanse,CRYPTO_clear_free,CRYPTO_clear_free,2_2_00007FF8A93343A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A934A3A0 EVP_PKEY_CTX_new_from_pkey,ERR_new,ERR_set_debug,EVP_PKEY_decrypt_init,ERR_new,ERR_set_debug,X509_get0_pubkey,ERR_clear_error,ASN1_item_d2i,ASN1_TYPE_get,ERR_new,ERR_set_debug,EVP_PKEY_decrypt,ERR_new,EVP_PKEY_CTX_ctrl,ERR_new,ERR_new,ERR_set_debug,EVP_PKEY_CTX_free,ASN1_item_free,2_2_00007FF8A934A3A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1217 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,2_2_00007FF8A92D1217
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D103C CRYPTO_malloc,COMP_expand_block,2_2_00007FF8A92D103C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93046B0 CRYPTO_realloc,memcpy,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A93046B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F26C0 ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_zalloc,CRYPTO_THREAD_lock_new,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,OPENSSL_sk_dup,X509_VERIFY_PARAM_new,X509_VERIFY_PARAM_inherit,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_malloc,memcpy,CRYPTO_new_ex_data,2_2_00007FF8A92F26C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931E6B0 CRYPTO_free,2_2_00007FF8A931E6B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2036 CRYPTO_free,2_2_00007FF8A92D2036
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D24FA CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,2_2_00007FF8A92D24FA
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D16A4 CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D16A4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1EE7 CRYPTO_free,CRYPTO_strndup,CRYPTO_free,OPENSSL_cleanse,_time64,memcpy,EVP_MD_get0_name,EVP_MD_is_a,ERR_new,ERR_set_debug,OPENSSL_cleanse,ERR_new,OPENSSL_cleanse,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_new,EVP_MD_get_size,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,2_2_00007FF8A92D1EE7
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1488 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D1488
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1D98 EVP_CIPHER_CTX_free,EVP_CIPHER_CTX_free,EVP_CIPHER_CTX_free,CRYPTO_zalloc,EVP_MAC_CTX_free,EVP_MAC_free,CRYPTO_free,EVP_CIPHER_CTX_free,EVP_MAC_fetch,EVP_MAC_CTX_new,EVP_MAC_free,EVP_CIPHER_CTX_new,EVP_CIPHER_fetch,OSSL_PARAM_construct_utf8_string,OSSL_PARAM_construct_end,EVP_MAC_init,EVP_DecryptInit_ex,EVP_CIPHER_free,EVP_CIPHER_free,EVP_CIPHER_free,EVP_MAC_CTX_get_mac_size,EVP_CIPHER_CTX_get_iv_length,EVP_MAC_final,CRYPTO_memcmp,CRYPTO_malloc,CRYPTO_free,CRYPTO_free,memcpy,ERR_clear_error,CRYPTO_free,EVP_CIPHER_CTX_free,EVP_MAC_CTX_free,CRYPTO_free,2_2_00007FF8A92D1D98
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DE592 ERR_set_debug,CRYPTO_free,CRYPTO_strdup,ERR_new,2_2_00007FF8A92DE592
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2059 CRYPTO_free,CRYPTO_malloc,ERR_new,RAND_bytes_ex,ERR_new,ERR_new,ERR_new,ERR_new,ERR_set_debug,2_2_00007FF8A92D2059
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1AC3 CRYPTO_THREAD_read_lock,CRYPTO_THREAD_unlock,2_2_00007FF8A92D1AC3
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931E870 CRYPTO_free,2_2_00007FF8A931E870
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1B54 memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,memcmp,EVP_CIPHER_CTX_free,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcmp,memcpy,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,2_2_00007FF8A92D1B54
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931E8D0 CRYPTO_free,2_2_00007FF8A931E8D0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F0880 X509_VERIFY_PARAM_free,CRYPTO_free_ex_data,BIO_pop,BIO_free,BIO_free_all,BIO_free_all,BUF_MEM_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,SCT_LIST_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,EVP_MD_CTX_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,ASYNC_WAIT_CTX_free,CRYPTO_free,OPENSSL_sk_free,CRYPTO_THREAD_lock_free,CRYPTO_free,2_2_00007FF8A92F0880
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9314880 CRYPTO_malloc,memset,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,2_2_00007FF8A9314880
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D23EC EVP_MD_get_size,EVP_CIPHER_get_iv_length,EVP_CIPHER_get_key_length,CRYPTO_clear_free,CRYPTO_malloc,ERR_new,ERR_set_debug,2_2_00007FF8A92D23EC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9312890 ERR_new,ERR_set_debug,BN_num_bits,CRYPTO_malloc,ERR_new,ERR_set_debug,BN_bn2bin,ERR_new,ERR_set_debug,BN_clear_free,BN_clear_free,CRYPTO_clear_free,ERR_new,ERR_set_debug,BN_clear_free,BN_clear_free,BN_clear_free,2_2_00007FF8A9312890
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92EE72A CRYPTO_THREAD_write_lock,2_2_00007FF8A92EE72A
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92EE72C CRYPTO_THREAD_write_lock,2_2_00007FF8A92EE72C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1893 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_strdup,ERR_new,ERR_set_debug,2_2_00007FF8A92D1893
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D26F8 BIO_s_file,BIO_new,ERR_new,ERR_set_debug,BIO_ctrl,ERR_new,ERR_set_debug,strncmp,ERR_new,ERR_set_debug,strncmp,CRYPTO_realloc,memcpy,CRYPTO_free,CRYPTO_free,CRYPTO_free,PEM_read_bio,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,BIO_free,2_2_00007FF8A92D26F8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1AB4 CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_memdup,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,2_2_00007FF8A92D1AB4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9328700 CRYPTO_free,CRYPTO_memdup,2_2_00007FF8A9328700
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D198D CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,2_2_00007FF8A92D198D
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931E731 CRYPTO_free,CRYPTO_free,2_2_00007FF8A931E731
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E27B0 CRYPTO_THREAD_run_once,2_2_00007FF8A92E27B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D24DC CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,2_2_00007FF8A92D24DC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D223E ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_clear_free,2_2_00007FF8A92D223E
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9334780 ERR_new,ERR_set_debug,X509_get0_pubkey,ERR_new,ERR_set_debug,CRYPTO_malloc,ERR_new,ERR_set_debug,RAND_bytes_ex,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_CTX_new_from_pkey,EVP_PKEY_encrypt_init,EVP_PKEY_encrypt,EVP_PKEY_encrypt,EVP_PKEY_CTX_free,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_clear_free,EVP_PKEY_CTX_free,2_2_00007FF8A9334780
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D193D CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D193D
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E1AA0 CRYPTO_free,CRYPTO_strndup,2_2_00007FF8A92E1AA0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9333A90 ERR_new,ERR_set_debug,X509_get0_pubkey,EVP_PKEY_CTX_new_from_pkey,ERR_new,ERR_set_debug,CRYPTO_malloc,EVP_PKEY_encrypt_init,RAND_bytes_ex,EVP_MD_CTX_new,EVP_DigestInit,EVP_DigestUpdate,EVP_DigestUpdate,EVP_DigestFinal_ex,EVP_MD_CTX_free,EVP_PKEY_CTX_ctrl,EVP_PKEY_encrypt,EVP_PKEY_CTX_free,ERR_new,ERR_set_debug,EVP_PKEY_CTX_free,CRYPTO_clear_free,EVP_MD_CTX_free,2_2_00007FF8A9333A90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D12D0 CRYPTO_THREAD_run_once,2_2_00007FF8A92D12D0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9321950 ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,CRYPTO_free,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,2_2_00007FF8A9321950
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931D960 RAND_bytes_ex,CRYPTO_malloc,memset,2_2_00007FF8A931D960
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A933D9E0 CRYPTO_malloc,ERR_new,ERR_set_debug,memcpy,2_2_00007FF8A933D9E0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1023 ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D1023
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D11C2 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D11C2
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93199A0 ERR_new,ERR_set_debug,EVP_MD_CTX_get0_md,EVP_MD_get_size,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memcmp,ERR_set_mark,ERR_pop_to_mark,ERR_new,ERR_set_debug,ERR_clear_last_mark,EVP_MD_CTX_get0_md,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,2_2_00007FF8A93199A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1087 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_THREAD_run_once,CRYPTO_THREAD_run_once,CRYPTO_THREAD_run_once,2_2_00007FF8A92D1087
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9313C30 CRYPTO_free,CRYPTO_free,OPENSSL_cleanse,CRYPTO_free,CRYPTO_free,OPENSSL_cleanse,CRYPTO_free,CRYPTO_free,2_2_00007FF8A9313C30
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E7CB0 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,2_2_00007FF8A92E7CB0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A932FCC0 CRYPTO_free,CRYPTO_memdup,2_2_00007FF8A932FCC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2536 CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D2536
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9303B10 CRYPTO_malloc,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,memset,OSSL_PARAM_locate_const,CRYPTO_strdup,ERR_new,ERR_set_debug,OSSL_PARAM_locate_const,CRYPTO_strdup,ERR_new,OSSL_PARAM_locate_const,OSSL_PARAM_locate_const,CRYPTO_strdup,ERR_new,OSSL_PARAM_locate_const,OSSL_PARAM_get_uint,OSSL_PARAM_locate_const,OSSL_PARAM_get_uint,ERR_new,OSSL_PARAM_locate_const,OSSL_PARAM_locate_const,OSSL_PARAM_get_int,OSSL_PARAM_locate_const,OSSL_PARAM_get_int,OSSL_PARAM_locate_const,OSSL_PARAM_get_int,ERR_set_mark,EVP_KEYMGMT_free,ERR_pop_to_mark,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A9303B10
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DFB00 EVP_PKEY_CTX_new_from_pkey,EVP_PKEY_derive_set_peer,EVP_PKEY_is_a,CRYPTO_malloc,ERR_new,ERR_set_debug,EVP_PKEY_derive,ERR_new,ERR_new,ERR_set_debug,CRYPTO_clear_free,EVP_PKEY_CTX_free,ERR_new,ERR_set_debug,2_2_00007FF8A92DFB00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931FB00 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A931FB00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D19E7 CRYPTO_free,2_2_00007FF8A92D19E7
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D5E4A BIO_get_data,BIO_get_init,BIO_clear_flags,BIO_set_init,CRYPTO_free,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,BIO_set_init,BIO_clear_flags,BIO_get_data,BIO_set_shutdown,BIO_push,BIO_set_next,BIO_up_ref,BIO_set_init,2_2_00007FF8A92D5E4A
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D3EE0 CRYPTO_free,2_2_00007FF8A92D3EE0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9339E90 ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,CRYPTO_strndup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A9339E90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D176C CRYPTO_malloc,CRYPTO_THREAD_lock_new,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,X509_up_ref,X509_chain_up_ref,CRYPTO_strdup,CRYPTO_strdup,CRYPTO_dup_ex_data,CRYPTO_strdup,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_strdup,CRYPTO_memdup,2_2_00007FF8A92D176C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E9D50 CRYPTO_free,CRYPTO_strdup,2_2_00007FF8A92E9D50
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DFDB0 ERR_new,ERR_set_debug,EVP_PKEY_CTX_new_from_pkey,CRYPTO_malloc,CRYPTO_malloc,EVP_PKEY_encapsulate,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_clear_free,CRYPTO_free,EVP_PKEY_CTX_free,2_2_00007FF8A92DFDB0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9327DE0 CRYPTO_memdup,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A9327DE0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D108C ERR_new,ERR_set_debug,CRYPTO_free,2_2_00007FF8A92D108C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D25EF CRYPTO_malloc,ERR_new,ERR_set_debug,memcpy,ERR_new,ERR_set_debug,2_2_00007FF8A92D25EF
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D157D CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,2_2_00007FF8A92D157D
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D11E0 EVP_PKEY_free,X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,X509_STORE_free,X509_STORE_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_free,2_2_00007FF8A92D11E0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F5DE0 CRYPTO_zalloc,CRYPTO_zalloc,OBJ_nid2sn,EVP_get_digestbyname,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92F5DE0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92FDDC0 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,_time64,CRYPTO_THREAD_lock_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_new_ex_data,CRYPTO_THREAD_lock_free,CRYPTO_free,2_2_00007FF8A92FDDC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D107D CRYPTO_free,2_2_00007FF8A92D107D
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E60B0 COMP_zlib,OPENSSL_sk_new,COMP_get_type,CRYPTO_malloc,COMP_get_name,OPENSSL_sk_push,OPENSSL_sk_sort,2_2_00007FF8A92E60B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2734 CRYPTO_free,CRYPTO_strdup,2_2_00007FF8A92D2734
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F6080 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92F6080
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E40F0 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_THREAD_lock_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,2_2_00007FF8A92E40F0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93280B0 CRYPTO_free,CRYPTO_free,2_2_00007FF8A93280B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1B31 CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D1B31
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A932FF50 CRYPTO_free,CRYPTO_strndup,2_2_00007FF8A932FF50
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1ACD ERR_new,ERR_set_debug,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,memcpy,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,memcpy,ERR_new,memcpy,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D1ACD
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E7F00 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_malloc,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,strncmp,CRYPTO_free,CRYPTO_free,OPENSSL_sk_new_null,CRYPTO_free,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_push,OPENSSL_sk_delete,OPENSSL_sk_num,OPENSSL_sk_push,CRYPTO_free,OPENSSL_sk_free,CRYPTO_free,OPENSSL_sk_free,2_2_00007FF8A92E7F00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D25A4 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,2_2_00007FF8A92D25A4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9333F10 EVP_MD_CTX_new,EVP_DigestInit,EVP_DigestUpdate,EVP_DigestUpdate,EVP_DigestFinal_ex,EVP_MD_CTX_free,CRYPTO_malloc,EVP_PKEY_CTX_ctrl,EVP_PKEY_encrypt,EVP_PKEY_CTX_free,ERR_new,ERR_set_debug,EVP_PKEY_CTX_free,CRYPTO_clear_free,ERR_new,ERR_set_debug,2_2_00007FF8A9333F10
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1B18 ERR_new,ERR_set_debug,memset,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,OPENSSL_cleanse,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_new,ERR_set_debug,OPENSSL_cleanse,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memcmp,ERR_new,ERR_new,2_2_00007FF8A92D1B18
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1D8E CRYPTO_free,CRYPTO_memdup,2_2_00007FF8A92D1D8E
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F5F90 CRYPTO_free,CRYPTO_free,2_2_00007FF8A92F5F90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D144C EVP_MD_CTX_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,memcpy,2_2_00007FF8A92D144C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E5FD0 OPENSSL_sk_new,COMP_get_type,CRYPTO_malloc,OPENSSL_sk_push,OPENSSL_sk_sort,2_2_00007FF8A92E5FD0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2400 CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D2400
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9313270 CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,2_2_00007FF8A9313270
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F9274 CRYPTO_free,EVP_PKEY_free,CRYPTO_free,2_2_00007FF8A92F9274
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1F91 CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,2_2_00007FF8A92D1F91
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2121 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,2_2_00007FF8A92D2121
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2478 CRYPTO_memcmp,ERR_new,ERR_set_debug,memchr,ERR_new,CRYPTO_free,CRYPTO_free,CRYPTO_strndup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D2478
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93052D8 EVP_MAC_CTX_free,CRYPTO_free,2_2_00007FF8A93052D8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1113 EVP_PKEY_free,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_new,ERR_new,ERR_set_debug,EVP_DigestVerifyInit_ex,ERR_new,ERR_set_debug,ERR_new,CRYPTO_free,ERR_new,ERR_set_debug,EVP_MD_CTX_free,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_free,2_2_00007FF8A92D1113
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9343160 CRYPTO_free,CRYPTO_strndup,2_2_00007FF8A9343160
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92EF100 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,BUF_MEM_free,EVP_MD_CTX_free,X509_free,X509_VERIFY_PARAM_move_peername,CRYPTO_free,2_2_00007FF8A92EF100
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A933B100 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,2_2_00007FF8A933B100
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D20EF CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D20EF
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92FF1F0 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,_time64,CRYPTO_THREAD_lock_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_new_ex_data,CRYPTO_THREAD_lock_free,ERR_new,ERR_set_debug,CRYPTO_free_ex_data,OPENSSL_cleanse,OPENSSL_cleanse,X509_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_clear_free,memcpy,2_2_00007FF8A92FF1F0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D214E EVP_CIPHER_get_mode,EVP_CIPHER_get_mode,EVP_CIPHER_get_iv_length,EVP_CIPHER_get_key_length,CRYPTO_malloc,ERR_new,ERR_set_debug,2_2_00007FF8A92D214E
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9309440 CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A9309440
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A934545B CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A934545B
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D195B CRYPTO_zalloc,EVP_MAC_free,EVP_MAC_CTX_free,CRYPTO_free,2_2_00007FF8A92D195B
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93214C0 CRYPTO_memcmp,2_2_00007FF8A93214C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D105F ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,CRYPTO_clear_free,CRYPTO_clear_free,2_2_00007FF8A92D105F
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D13DE EVP_MD_CTX_new,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get_security_bits,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_free,EVP_PKEY_get_bn_param,EVP_PKEY_get_bn_param,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,BN_num_bits,BN_num_bits,memset,BN_num_bits,BN_bn2bin,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_get0_name,EVP_DigestSignInit_ex,ERR_new,ERR_set_debug,EVP_PKEY_CTX_set_rsa_padding,EVP_PKEY_CTX_set_rsa_pss_saltlen,ERR_new,ERR_set_debug,EVP_DigestSign,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,BN_free,BN_free,BN_free,BN_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D13DE
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1A41 CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,memcmp,ERR_new,ERR_set_debug,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D1A41
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1E6F ERR_new,ERR_set_debug,CRYPTO_clear_free,2_2_00007FF8A92D1E6F
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A933B4A0 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A933B4A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D11AE EVP_MAC_CTX_free,CRYPTO_free,2_2_00007FF8A92D11AE
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9327310 CRYPTO_realloc,2_2_00007FF8A9327310
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9343330 CRYPTO_malloc,ERR_new,ERR_set_debug,EVP_CIPHER_CTX_new,ERR_new,ERR_new,ERR_new,ERR_set_debug,EVP_CIPHER_fetch,EVP_CIPHER_get_iv_length,RAND_bytes_ex,EVP_CIPHER_free,EVP_EncryptUpdate,EVP_EncryptFinal,ERR_new,ERR_new,ERR_new,ERR_set_debug,EVP_CIPHER_CTX_get_iv_length,ERR_new,ERR_new,CRYPTO_free,EVP_CIPHER_CTX_free,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,EVP_CIPHER_CTX_free,2_2_00007FF8A9343330
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1A23 BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,CRYPTO_strdup,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,2_2_00007FF8A92D1A23
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92FD3A0 CRYPTO_THREAD_write_lock,OPENSSL_sk_new_null,OPENSSL_LH_delete,OPENSSL_sk_push,OPENSSL_LH_set_down_load,CRYPTO_THREAD_unlock,OPENSSL_sk_pop_free,2_2_00007FF8A92FD3A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DD390 CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_clear_free,CRYPTO_free,CRYPTO_free,EVP_PKEY_free,EVP_PKEY_free,CRYPTO_free,CRYPTO_free,memset,CRYPTO_free,2_2_00007FF8A92DD390
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D21F8 ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,memcpy,ERR_new,ERR_set_debug,2_2_00007FF8A92D21F8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A934B380 BN_bin2bn,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A934B380
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9331390 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,2_2_00007FF8A9331390
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D21B7 CRYPTO_free,2_2_00007FF8A92D21B7
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DF620 CRYPTO_free,CRYPTO_memdup,2_2_00007FF8A92DF620
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1267 X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,2_2_00007FF8A92D1267
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1398 OSSL_PROVIDER_do_all,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,2_2_00007FF8A92D1398
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1654 EVP_MD_CTX_new,ERR_new,ERR_set_debug,X509_get0_pubkey,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get_id,EVP_PKEY_get_id,EVP_PKEY_get_id,EVP_MD_get0_name,EVP_DigestVerifyInit_ex,ERR_new,ERR_set_debug,CRYPTO_malloc,ERR_new,ERR_set_debug,BUF_reverse,EVP_PKEY_CTX_set_rsa_padding,EVP_PKEY_CTX_set_rsa_pss_saltlen,ERR_new,EVP_MD_CTX_ctrl,ERR_new,ERR_set_debug,ERR_new,EVP_DigestVerify,ERR_new,ERR_new,ERR_new,ERR_set_debug,BIO_free,EVP_MD_CTX_free,CRYPTO_free,2_2_00007FF8A92D1654
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1B90 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,2_2_00007FF8A92D1B90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1677 CRYPTO_THREAD_write_lock,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,2_2_00007FF8A92D1677
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9327540 CRYPTO_malloc,CRYPTO_malloc,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A9327540
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1D02 CRYPTO_zalloc,CRYPTO_zalloc,2_2_00007FF8A92D1D02
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93335D0 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,ERR_new,ERR_set_debug,EVP_PKEY_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,EVP_PKEY_free,2_2_00007FF8A93335D0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2388 CRYPTO_free,2_2_00007FF8A92D2388
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1992 ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_zalloc,CRYPTO_THREAD_lock_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_strdup,OPENSSL_LH_new,X509_STORE_new,CTLOG_STORE_new_ex,OPENSSL_sk_num,X509_VERIFY_PARAM_new,OPENSSL_sk_new_null,OPENSSL_sk_new_null,CRYPTO_new_ex_data,CRYPTO_secure_zalloc,RAND_bytes_ex,RAND_priv_bytes_ex,RAND_priv_bytes_ex,RAND_priv_bytes_ex,ERR_new,ERR_set_debug,2_2_00007FF8A92D1992
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1483 CRYPTO_free,CRYPTO_strndup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D1483
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1846 OPENSSL_sk_new_null,ERR_new,ERR_set_debug,X509_new_ex,d2i_X509,CRYPTO_free,CRYPTO_memcmp,ERR_new,ERR_set_debug,OPENSSL_sk_push,OPENSSL_sk_num,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,X509_free,OPENSSL_sk_pop_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,OPENSSL_sk_value,X509_get0_pubkey,ERR_new,ERR_set_debug,X509_free,OPENSSL_sk_shift,OPENSSL_sk_pop_free,ERR_new,ERR_set_debug,2_2_00007FF8A92D1846
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1997 ERR_new,ERR_set_debug,EVP_PKEY_CTX_new_from_pkey,CRYPTO_malloc,ERR_new,ERR_set_debug,EVP_PKEY_decapsulate,ERR_new,ERR_new,ERR_set_debug,CRYPTO_clear_free,EVP_PKEY_CTX_free,2_2_00007FF8A92D1997
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DD8AF CRYPTO_free,2_2_00007FF8A92DD8AF
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1555 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,2_2_00007FF8A92D1555
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93158F0 CRYPTO_free,2_2_00007FF8A93158F0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D231F ERR_new,ERR_set_debug,_time64,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_new,EVP_MD_fetch,ERR_new,ERR_new,ERR_set_debug,EVP_MD_free,EVP_MD_get_size,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,EVP_MD_free,CRYPTO_free,2_2_00007FF8A92D231F
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9333880 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,EVP_PKEY_free,2_2_00007FF8A9333880
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1EE2 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,OPENSSL_sk_find,CRYPTO_free,ERR_new,ERR_set_debug,OPENSSL_sk_push,CRYPTO_free,ERR_new,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92D1EE2
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A933B8B0 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A933B8B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92FD730 CRYPTO_free_ex_data,OPENSSL_cleanse,OPENSSL_cleanse,X509_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_clear_free,2_2_00007FF8A92FD730
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DD710 CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,2_2_00007FF8A92DD710
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2130 memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,memcmp,ERR_new,ERR_set_debug,_time64,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,2_2_00007FF8A92D2130
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1122 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,EVP_PKEY_up_ref,X509_up_ref,EVP_PKEY_up_ref,X509_chain_up_ref,CRYPTO_malloc,memcpy,CRYPTO_malloc,memcpy,ERR_new,ERR_set_debug,ERR_set_error,EVP_PKEY_free,X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,X509_STORE_free,X509_STORE_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_free,ERR_new,CRYPTO_malloc,memcpy,CRYPTO_memdup,X509_STORE_up_ref,X509_STORE_up_ref,CRYPTO_strdup,2_2_00007FF8A92D1122
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9321730 CRYPTO_free,CRYPTO_memdup,2_2_00007FF8A9321730
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D20FE CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,CRYPTO_free,2_2_00007FF8A92D20FE
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9331786 CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,2_2_00007FF8A9331786
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92DB7C0 CRYPTO_clear_free,2_2_00007FF8A92DB7C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B24EC4 ASN1_STRING_type,ASN1_STRING_length,ASN1_STRING_get0_data,_Py_BuildValue_SizeT,ASN1_STRING_to_UTF8,_Py_Dealloc,_Py_BuildValue_SizeT,CRYPTO_free,2_2_00007FF8B8B24EC4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B24C40 i2d_X509,PyBytes_FromStringAndSize,CRYPTO_free,2_2_00007FF8B8B24C40
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CE61B8 CRYPTO_memcmp,2_2_00007FF8B8CE61B8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CE18E0 _Py_NoneStruct,_PyArg_UnpackKeywords,PyObject_GetBuffer,PyBuffer_IsContiguous,PyObject_GetBuffer,PyBuffer_IsContiguous,PyLong_AsUnsignedLong,PyLong_AsUnsignedLong,PyLong_AsUnsignedLong,EVP_PBE_scrypt,PyBytes_FromStringAndSize,PyEval_SaveThread,EVP_PBE_scrypt,PyEval_RestoreThread,PyExc_ValueError,PyErr_SetString,PyBuffer_Release,PyBuffer_Release,PyLong_AsLong,PyErr_Occurred,PyLong_AsLong,PyErr_Occurred,PyExc_ValueError,PyExc_ValueError,PyErr_Format,_PyArg_BadArgument,_PyArg_BadArgument,_PyArg_BadArgument,PyExc_TypeError,PyErr_Occurred,PyExc_TypeError,PyErr_Occurred,PyExc_TypeError,PyErr_Occurred,PyExc_TypeError,_PyArg_BadArgument,_PyArg_BadArgument,PyExc_OverflowError,PyExc_OverflowError,_Py_Dealloc,PyExc_ValueError,2_2_00007FF8B8CE18E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDE8D0 CRYPTO_free,21_2_00007FF8A7CDE8D0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91B54 memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,memcmp,EVP_CIPHER_CTX_free,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcmp,memcpy,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,21_2_00007FF8A7C91B54
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C923EC EVP_MD_get_size,EVP_CIPHER_get_iv_length,EVP_CIPHER_get_key_length,CRYPTO_clear_free,CRYPTO_malloc,ERR_new,ERR_set_debug,21_2_00007FF8A7C923EC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD2890 ERR_new,ERR_set_debug,BN_num_bits,CRYPTO_malloc,ERR_new,ERR_set_debug,BN_bn2bin,ERR_new,ERR_set_debug,BN_clear_free,BN_clear_free,CRYPTO_clear_free,ERR_new,ERR_set_debug,BN_clear_free,BN_clear_free,BN_clear_free,21_2_00007FF8A7CD2890
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB0880 X509_VERIFY_PARAM_free,CRYPTO_free_ex_data,BIO_pop,BIO_free,BIO_free_all,BIO_free_all,BUF_MEM_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,SCT_LIST_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,EVP_MD_CTX_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,ASYNC_WAIT_CTX_free,CRYPTO_free,OPENSSL_sk_free,CRYPTO_THREAD_lock_free,CRYPTO_free,21_2_00007FF8A7CB0880
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD4880 CRYPTO_malloc,memset,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,21_2_00007FF8A7CD4880
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDE870 CRYPTO_free,21_2_00007FF8A7CDE870
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9223E ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_clear_free,21_2_00007FF8A7C9223E
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF4780 ERR_new,ERR_set_debug,X509_get0_pubkey,ERR_new,ERR_set_debug,CRYPTO_malloc,ERR_new,ERR_set_debug,RAND_bytes_ex,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_CTX_new_from_pkey,EVP_PKEY_encrypt_init,EVP_PKEY_encrypt,EVP_PKEY_encrypt,EVP_PKEY_CTX_free,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_clear_free,EVP_PKEY_CTX_free,21_2_00007FF8A7CF4780
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA27B0 CRYPTO_THREAD_run_once,21_2_00007FF8A7CA27B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C924DC CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,21_2_00007FF8A7C924DC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9198D CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,21_2_00007FF8A7C9198D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C926F8 BIO_s_file,BIO_new,ERR_new,ERR_set_debug,BIO_ctrl,ERR_new,ERR_set_debug,strncmp,ERR_new,ERR_set_debug,strncmp,CRYPTO_realloc,memcpy,CRYPTO_free,CRYPTO_free,CRYPTO_free,PEM_read_bio,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,BIO_free,21_2_00007FF8A7C926F8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91893 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_strdup,ERR_new,ERR_set_debug,21_2_00007FF8A7C91893
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91AB4 CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_memdup,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,21_2_00007FF8A7C91AB4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE8700 CRYPTO_free,CRYPTO_memdup,21_2_00007FF8A7CE8700
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CAE72A CRYPTO_THREAD_write_lock,21_2_00007FF8A7CAE72A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDE731 CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CDE731
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CAE72C CRYPTO_THREAD_write_lock,21_2_00007FF8A7CAE72C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB26C0 ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_zalloc,CRYPTO_THREAD_lock_new,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,OPENSSL_sk_dup,X509_VERIFY_PARAM_new,X509_VERIFY_PARAM_inherit,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_malloc,memcpy,CRYPTO_new_ex_data,21_2_00007FF8A7CB26C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CC46B0 CRYPTO_realloc,memcpy,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7CC46B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDE6B0 CRYPTO_free,21_2_00007FF8A7CDE6B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91217 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,21_2_00007FF8A7C91217
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9103C CRYPTO_malloc,COMP_expand_block,21_2_00007FF8A7C9103C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91D98 EVP_CIPHER_CTX_free,EVP_CIPHER_CTX_free,EVP_CIPHER_CTX_free,CRYPTO_zalloc,EVP_MAC_CTX_free,EVP_MAC_free,CRYPTO_free,EVP_CIPHER_CTX_free,EVP_MAC_fetch,EVP_MAC_CTX_new,EVP_MAC_free,EVP_CIPHER_CTX_new,EVP_CIPHER_fetch,OSSL_PARAM_construct_utf8_string,OSSL_PARAM_construct_end,EVP_MAC_init,EVP_DecryptInit_ex,EVP_CIPHER_free,EVP_CIPHER_free,EVP_CIPHER_free,EVP_MAC_CTX_get_mac_size,EVP_CIPHER_CTX_get_iv_length,EVP_MAC_final,CRYPTO_memcmp,CRYPTO_malloc,CRYPTO_free,CRYPTO_free,memcpy,ERR_clear_error,CRYPTO_free,EVP_CIPHER_CTX_free,EVP_MAC_CTX_free,CRYPTO_free,21_2_00007FF8A7C91D98
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91EE7 CRYPTO_free,CRYPTO_strndup,CRYPTO_free,OPENSSL_cleanse,_time64,memcpy,EVP_MD_get0_name,EVP_MD_is_a,ERR_new,ERR_set_debug,OPENSSL_cleanse,ERR_new,OPENSSL_cleanse,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_new,EVP_MD_get_size,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_set_debug,21_2_00007FF8A7C91EE7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91AC3 CRYPTO_THREAD_read_lock,CRYPTO_THREAD_unlock,21_2_00007FF8A7C91AC3
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92059 CRYPTO_free,CRYPTO_malloc,ERR_new,RAND_bytes_ex,ERR_new,ERR_new,ERR_new,ERR_new,ERR_set_debug,21_2_00007FF8A7C92059
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9E592 ERR_set_debug,CRYPTO_free,CRYPTO_strdup,ERR_new,21_2_00007FF8A7C9E592
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91488 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C91488
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92036 CRYPTO_free,21_2_00007FF8A7C92036
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C924FA CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,21_2_00007FF8A7C924FA
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C916A4 CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C916A4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CBE4F0 CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,21_2_00007FF8A7CBE4F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C918B6 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C918B6
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9E4A0 CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C9E4A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91627 EVP_MD_CTX_new,ERR_new,ERR_set_debug,ERR_new,EVP_MD_get0_name,EVP_DigestSignInit_ex,ERR_new,ERR_set_debug,EVP_PKEY_CTX_set_rsa_padding,EVP_PKEY_CTX_set_rsa_pss_saltlen,ERR_new,EVP_DigestSignUpdate,EVP_DigestSignFinal,CRYPTO_malloc,EVP_DigestSignFinal,ERR_new,ERR_new,EVP_DigestSign,ERR_new,CRYPTO_malloc,EVP_DigestSign,BUF_reverse,ERR_new,CRYPTO_free,EVP_MD_CTX_free,ERR_new,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,EVP_MD_CTX_free,21_2_00007FF8A7C91627
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C96460 BIO_get_data,BIO_get_shutdown,BIO_get_init,BIO_clear_flags,BIO_set_init,CRYPTO_free,21_2_00007FF8A7C96460
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D08450 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcmp,ERR_new,ERR_new,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,ERR_new,ERR_set_debug,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,OPENSSL_sk_free,OPENSSL_sk_dup,OPENSSL_sk_free,OPENSSL_sk_dup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_num,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_free,ERR_new,OPENSSL_sk_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7D08450
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C915E1 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,memcpy,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C915E1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D0A3A0 EVP_PKEY_CTX_new_from_pkey,ERR_new,ERR_set_debug,EVP_PKEY_decrypt_init,ERR_new,ERR_set_debug,X509_get0_pubkey,ERR_clear_error,ASN1_item_d2i,ASN1_TYPE_get,ERR_new,ERR_set_debug,EVP_PKEY_decrypt,ERR_new,EVP_PKEY_CTX_ctrl,ERR_new,ERR_new,ERR_set_debug,EVP_PKEY_CTX_free,ASN1_item_free,21_2_00007FF8A7D0A3A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91F5A CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,21_2_00007FF8A7C91F5A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CAC3A0 CRYPTO_free,CRYPTO_memdup,21_2_00007FF8A7CAC3A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF43A0 ERR_new,ERR_set_debug,memset,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memdup,CRYPTO_strdup,CRYPTO_free,CRYPTO_free,ERR_new,ERR_new,ERR_set_debug,OPENSSL_cleanse,OPENSSL_cleanse,CRYPTO_clear_free,CRYPTO_clear_free,21_2_00007FF8A7CF43A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91F41 CRYPTO_malloc,ERR_new,ERR_set_debug,21_2_00007FF8A7C91F41
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CFC370 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,memcpy,EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CFC370
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB2360 memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,21_2_00007FF8A7CB2360
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C94330 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C94330
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C919DD BN_copy,BN_free,BN_dup,BN_copy,BN_free,BN_dup,BN_copy,BN_free,BN_dup,BN_copy,BN_free,CRYPTO_free,CRYPTO_strdup,21_2_00007FF8A7C919DD
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE8330 CRYPTO_memcmp,21_2_00007FF8A7CE8330
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91366 CRYPTO_malloc,EVP_PKEY_set_type,EVP_PKEY_CTX_new_from_pkey,EVP_PKEY_CTX_free,ERR_pop_to_mark,CRYPTO_free,EVP_PKEY_free,21_2_00007FF8A7C91366
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA62F0 CRYPTO_THREAD_run_once,21_2_00007FF8A7CA62F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB6290 ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,EVP_MD_get_size,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_malloc,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,memcpy,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_insert,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,EVP_PKEY_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,d2i_X509,X509_get0_pubkey,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,X509_free,OPENSSL_sk_new_null,OPENSSL_sk_push,ERR_new,ERR_set_debug,ERR_set_error,X509_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7CB6290
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C923FB CRYPTO_free,CRYPTO_memdup,21_2_00007FF8A7C923FB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9138E CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C9138E
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C96233 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,BIO_set_init,BIO_set_data,BIO_clear_flags,21_2_00007FF8A7C96233
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDE1D0 CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7CDE1D0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91CF3 CRYPTO_malloc,memset,memcpy,memcpy,CRYPTO_clear_free,CRYPTO_clear_free,CRYPTO_clear_free,CRYPTO_clear_free,OPENSSL_cleanse,21_2_00007FF8A7C91CF3
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D06190 CRYPTO_memcmp,21_2_00007FF8A7D06190
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF6180 EVP_CIPHER_CTX_free,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,21_2_00007FF8A7CF6180
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDE160 CRYPTO_free,21_2_00007FF8A7CDE160
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9150A OPENSSL_sk_num,OPENSSL_sk_num,OPENSSL_sk_new_reserve,ERR_new,ERR_set_debug,ERR_set_error,OPENSSL_sk_value,X509_VERIFY_PARAM_get_depth,CRYPTO_dup_ex_data,X509_VERIFY_PARAM_inherit,OPENSSL_sk_dup,OPENSSL_sk_dup,21_2_00007FF8A7C9150A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C913D9 OPENSSL_sk_new_null,ERR_new,ERR_set_debug,X509_new_ex,d2i_X509,CRYPTO_free,OPENSSL_sk_push,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_new,ERR_set_debug,X509_free,OPENSSL_sk_pop_free,21_2_00007FF8A7C913D9
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92694 CRYPTO_THREAD_write_lock,CRYPTO_THREAD_unlock,21_2_00007FF8A7C92694
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91C58 CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,21_2_00007FF8A7C91C58
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C94130 CRYPTO_free,21_2_00007FF8A7C94130
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91181 _time64,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,21_2_00007FF8A7C91181
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD90C0 CRYPTO_malloc,ERR_new,ERR_set_debug,21_2_00007FF8A7CD90C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91A32 CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,21_2_00007FF8A7C91A32
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CAD040 CRYPTO_free,CRYPTO_free,CRYPTO_free_ex_data,OPENSSL_LH_free,X509_STORE_free,CTLOG_STORE_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_pop_free,OPENSSL_sk_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_secure_free,EVP_MD_get0_provider,EVP_MD_free,EVP_MD_get0_provider,EVP_MD_free,EVP_CIPHER_get0_provider,EVP_CIPHER_free,EVP_MD_get0_provider,EVP_MD_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CAD040
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91186 EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C91186
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92379 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C92379
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91811 CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,21_2_00007FF8A7C91811
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C94FE0 CRYPTO_free,21_2_00007FF8A7C94FE0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C917F8 EVP_MD_CTX_new,EVP_PKEY_new_raw_private_key_ex,EVP_DigestSignInit_ex,EVP_DigestSign,EVP_MD_CTX_free,EVP_PKEY_free,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,_time64,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_free,EVP_PKEY_free,ERR_new,ERR_set_debug,EVP_MD_CTX_free,EVP_PKEY_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C917F8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91460 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,BIO_snprintf,21_2_00007FF8A7C91460
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D02F40 CRYPTO_free,CRYPTO_memdup,21_2_00007FF8A7D02F40
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91A05 ERR_new,ERR_set_debug,ERR_set_error,ASN1_item_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,memcpy,_time64,X509_free,memcpy,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,ASN1_item_free,21_2_00007FF8A7C91A05
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9258B ERR_new,ERR_set_debug,CRYPTO_free,BIO_clear_flags,BIO_set_flags,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,OPENSSL_cleanse,21_2_00007FF8A7C9258B
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D0AED0 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_malloc,ERR_new,ERR_set_debug,EVP_PKEY_CTX_new_from_pkey,ERR_new,ERR_set_debug,EVP_PKEY_decrypt_init,EVP_PKEY_CTX_set_rsa_padding,OSSL_PARAM_construct_uint,OSSL_PARAM_construct_end,EVP_PKEY_CTX_set_params,EVP_PKEY_decrypt,OPENSSL_cleanse,ERR_new,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,EVP_PKEY_CTX_free,21_2_00007FF8A7D0AED0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91370 ERR_new,ERR_set_debug,CRYPTO_THREAD_read_lock,CRYPTO_THREAD_unlock,ERR_new,ERR_set_debug,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,memset,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C91370
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD8E50 CRYPTO_malloc,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,21_2_00007FF8A7CD8E50
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CAEE43 CRYPTO_free,21_2_00007FF8A7CAEE43
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C922E8 CRYPTO_malloc,CONF_parse_list,CRYPTO_memdup,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C922E8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C917E9 ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,memcmp,ERR_new,CRYPTO_memdup,ERR_new,ERR_new,ERR_set_debug,21_2_00007FF8A7C917E9
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91771 CRYPTO_free,21_2_00007FF8A7C91771
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF6D90 CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,21_2_00007FF8A7CF6D90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA4DB0 i2d_X509_NAME,i2d_X509_NAME,memcmp,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CA4DB0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA4D50 CRYPTO_get_ex_new_index,21_2_00007FF8A7CA4D50
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF0D60 ERR_new,ERR_set_debug,CRYPTO_clear_free,21_2_00007FF8A7CF0D60
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD8D10 OPENSSL_cleanse,CRYPTO_free,21_2_00007FF8A7CD8D10
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C914CE CRYPTO_free,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,21_2_00007FF8A7C914CE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C917DF ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C917DF
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91CA8 CRYPTO_strdup,CRYPTO_free,21_2_00007FF8A7C91CA8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CBEC90 CRYPTO_THREAD_write_lock,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,21_2_00007FF8A7CBEC90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91154 CRYPTO_free,ERR_new,ERR_set_debug,21_2_00007FF8A7C91154
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD8C60 CRYPTO_free,21_2_00007FF8A7CD8C60
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDEC10 CRYPTO_free,21_2_00007FF8A7CDEC10
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C94C00 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C94C00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD2C30 SRP_Calc_u_ex,BN_num_bits,CRYPTO_malloc,ERR_new,ERR_set_debug,BN_bn2bin,BN_clear_free,BN_clear_free,21_2_00007FF8A7CD2C30
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91492 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C91492
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C926C6 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_strdup,21_2_00007FF8A7C926C6
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D02BC0 CRYPTO_memcmp,21_2_00007FF8A7D02BC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91212 EVP_PKEY_free,EVP_PKEY_free,CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_clear_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,memset,21_2_00007FF8A7C91212
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CAABB0 CRYPTO_free,CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,21_2_00007FF8A7CAABB0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDEBB0 CRYPTO_free,21_2_00007FF8A7CDEBB0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF4BB0 BN_num_bits,BN_bn2bin,CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7CF4BB0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C94B40 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C94B40
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92383 CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C92383
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D0AB20 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_strndup,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_memdup,OPENSSL_cleanse,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7D0AB20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92432 CRYPTO_zalloc,CRYPTO_zalloc,OBJ_nid2sn,EVP_get_digestbyname,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C92432
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C913A2 memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,21_2_00007FF8A7C913A2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91A0F ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_CIPHER_CTX_get0_cipher,EVP_CIPHER_get_flags,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_get0_md,EVP_MD_get_size,CRYPTO_memcmp,ERR_set_mark,ERR_clear_last_mark,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_pop_to_mark,ERR_clear_last_mark,ERR_new,ERR_set_debug,EVP_MD_CTX_get0_md,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,strncmp,strncmp,strncmp,strncmp,strncmp,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,21_2_00007FF8A7C91A0F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92608 CRYPTO_malloc,ERR_new,ERR_set_debug,memcpy,memcpy,memcmp,memcmp,memcmp,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_clear_free,21_2_00007FF8A7C92608
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C98A60 CRYPTO_zalloc,CRYPTO_free,21_2_00007FF8A7C98A60
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91F2D ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_strdup,21_2_00007FF8A7C91F2D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE89B0 CRYPTO_free,CRYPTO_strndup,21_2_00007FF8A7CE89B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9218F ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,CRYPTO_free,ERR_new,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,21_2_00007FF8A7C9218F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA4960 OPENSSL_sk_num,X509_STORE_CTX_new_ex,ERR_new,ERR_set_debug,ERR_set_error,OPENSSL_sk_value,X509_STORE_CTX_init,ERR_new,ERR_set_debug,ERR_set_error,X509_STORE_CTX_free,X509_STORE_CTX_set_flags,CRYPTO_THREAD_run_once,X509_STORE_CTX_set_ex_data,OPENSSL_sk_num,X509_STORE_CTX_set0_dane,X509_STORE_CTX_set_default,X509_VERIFY_PARAM_set1,X509_STORE_CTX_set_verify_cb,X509_verify_cert,X509_STORE_CTX_get_error,OPENSSL_sk_pop_free,X509_STORE_CTX_get0_chain,X509_STORE_CTX_get1_chain,ERR_new,ERR_set_debug,ERR_set_error,X509_VERIFY_PARAM_move_peername,X509_STORE_CTX_free,21_2_00007FF8A7CA4960
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91CC1 EVP_MD_get_size,ERR_new,ERR_set_debug,RAND_bytes_ex,ERR_new,ERR_set_debug,_time64,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C91CC1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91401 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C91401
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91555 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,21_2_00007FF8A7C91555
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91EE2 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,OPENSSL_sk_find,CRYPTO_free,ERR_new,ERR_set_debug,OPENSSL_sk_push,CRYPTO_free,ERR_new,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C91EE2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD58F0 CRYPTO_free,21_2_00007FF8A7CD58F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9231F ERR_new,ERR_set_debug,_time64,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_new,EVP_MD_fetch,ERR_new,ERR_new,ERR_set_debug,EVP_MD_free,EVP_MD_get_size,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,EVP_MD_free,CRYPTO_free,21_2_00007FF8A7C9231F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF3880 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,EVP_PKEY_free,21_2_00007FF8A7CF3880
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91997 ERR_new,ERR_set_debug,EVP_PKEY_CTX_new_from_pkey,CRYPTO_malloc,ERR_new,ERR_set_debug,EVP_PKEY_decapsulate,ERR_new,ERR_new,ERR_set_debug,CRYPTO_clear_free,EVP_PKEY_CTX_free,21_2_00007FF8A7C91997
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CFB8B0 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CFB8B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9D8AF CRYPTO_free,21_2_00007FF8A7C9D8AF
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91846 OPENSSL_sk_new_null,ERR_new,ERR_set_debug,X509_new_ex,d2i_X509,CRYPTO_free,CRYPTO_memcmp,ERR_new,ERR_set_debug,OPENSSL_sk_push,OPENSSL_sk_num,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,X509_free,OPENSSL_sk_pop_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,OPENSSL_sk_value,X509_get0_pubkey,ERR_new,ERR_set_debug,X509_free,OPENSSL_sk_shift,OPENSSL_sk_pop_free,ERR_new,ERR_set_debug,21_2_00007FF8A7C91846
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91483 CRYPTO_free,CRYPTO_strndup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C91483
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91992 ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_zalloc,CRYPTO_THREAD_lock_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_strdup,OPENSSL_LH_new,X509_STORE_new,CTLOG_STORE_new_ex,OPENSSL_sk_num,X509_VERIFY_PARAM_new,OPENSSL_sk_new_null,OPENSSL_sk_new_null,CRYPTO_new_ex_data,CRYPTO_secure_zalloc,RAND_bytes_ex,RAND_priv_bytes_ex,RAND_priv_bytes_ex,RAND_priv_bytes_ex,ERR_new,ERR_set_debug,21_2_00007FF8A7C91992
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9B7C0 CRYPTO_clear_free,21_2_00007FF8A7C9B7C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C920FE CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C920FE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF1786 CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_free,21_2_00007FF8A7CF1786
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92130 memcpy,CRYPTO_THREAD_read_lock,OPENSSL_LH_retrieve,CRYPTO_THREAD_unlock,CRYPTO_THREAD_unlock,memcmp,ERR_new,ERR_set_debug,_time64,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C92130
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91122 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,EVP_PKEY_up_ref,X509_up_ref,EVP_PKEY_up_ref,X509_chain_up_ref,CRYPTO_malloc,memcpy,CRYPTO_malloc,memcpy,ERR_new,ERR_set_debug,ERR_set_error,EVP_PKEY_free,X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,X509_STORE_free,X509_STORE_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_free,ERR_new,CRYPTO_malloc,memcpy,CRYPTO_memdup,X509_STORE_up_ref,X509_STORE_up_ref,CRYPTO_strdup,21_2_00007FF8A7C91122
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9D710 CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C9D710
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CBD730 CRYPTO_free_ex_data,OPENSSL_cleanse,OPENSSL_cleanse,X509_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_clear_free,21_2_00007FF8A7CBD730
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE1730 CRYPTO_free,CRYPTO_memdup,21_2_00007FF8A7CE1730
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91267 X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,21_2_00007FF8A7C91267
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91398 OSSL_PROVIDER_do_all,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,21_2_00007FF8A7C91398
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91654 EVP_MD_CTX_new,ERR_new,ERR_set_debug,X509_get0_pubkey,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get_id,EVP_PKEY_get_id,EVP_PKEY_get_id,EVP_MD_get0_name,EVP_DigestVerifyInit_ex,ERR_new,ERR_set_debug,CRYPTO_malloc,ERR_new,ERR_set_debug,BUF_reverse,EVP_PKEY_CTX_set_rsa_padding,EVP_PKEY_CTX_set_rsa_pss_saltlen,ERR_new,EVP_MD_CTX_ctrl,ERR_new,ERR_set_debug,ERR_new,EVP_DigestVerify,ERR_new,ERR_new,ERR_new,ERR_set_debug,BIO_free,EVP_MD_CTX_free,CRYPTO_free,21_2_00007FF8A7C91654
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9F620 CRYPTO_free,CRYPTO_memdup,21_2_00007FF8A7C9F620
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF35D0 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,ERR_new,ERR_set_debug,EVP_PKEY_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,EVP_PKEY_free,21_2_00007FF8A7CF35D0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92388 CRYPTO_free,21_2_00007FF8A7C92388
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91D02 CRYPTO_zalloc,CRYPTO_zalloc,21_2_00007FF8A7C91D02
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE7540 CRYPTO_malloc,CRYPTO_malloc,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CE7540
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91B90 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,21_2_00007FF8A7C91B90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91677 CRYPTO_THREAD_write_lock,OPENSSL_LH_retrieve,OPENSSL_LH_delete,CRYPTO_THREAD_unlock,21_2_00007FF8A7C91677
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C913DE EVP_MD_CTX_new,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get_security_bits,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_free,EVP_PKEY_get_bn_param,EVP_PKEY_get_bn_param,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,BN_num_bits,BN_num_bits,memset,BN_num_bits,BN_bn2bin,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_get0_name,EVP_DigestSignInit_ex,ERR_new,ERR_set_debug,EVP_PKEY_CTX_set_rsa_padding,EVP_PKEY_CTX_set_rsa_pss_saltlen,ERR_new,ERR_set_debug,EVP_DigestSign,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,EVP_MD_CTX_free,BN_free,BN_free,BN_free,BN_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C913DE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE14C0 CRYPTO_memcmp,21_2_00007FF8A7CE14C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9105F ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,EVP_PKEY_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,CRYPTO_clear_free,CRYPTO_clear_free,21_2_00007FF8A7C9105F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91A41 CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,memcmp,ERR_new,ERR_set_debug,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C91A41
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9195B CRYPTO_zalloc,EVP_MAC_free,EVP_MAC_CTX_free,CRYPTO_free,21_2_00007FF8A7C9195B
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91E6F ERR_new,ERR_set_debug,CRYPTO_clear_free,21_2_00007FF8A7C91E6F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CFB4A0 EVP_CIPHER_CTX_free,EVP_MD_CTX_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CFB4A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CC9440 CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7CC9440
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D0545B CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7D0545B
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C921B7 CRYPTO_free,21_2_00007FF8A7C921B7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91A23 BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,BN_dup,CRYPTO_strdup,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,21_2_00007FF8A7C91A23
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C921F8 ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,memcpy,ERR_new,ERR_set_debug,21_2_00007FF8A7C921F8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9D390 CRYPTO_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_clear_free,CRYPTO_free,CRYPTO_free,EVP_PKEY_free,EVP_PKEY_free,CRYPTO_free,CRYPTO_free,memset,CRYPTO_free,21_2_00007FF8A7C9D390
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF1390 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,21_2_00007FF8A7CF1390
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D0B380 BN_bin2bn,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_strdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7D0B380
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CBD3A0 CRYPTO_THREAD_write_lock,OPENSSL_sk_new_null,OPENSSL_LH_delete,OPENSSL_sk_push,OPENSSL_LH_set_down_load,CRYPTO_THREAD_unlock,OPENSSL_sk_pop_free,21_2_00007FF8A7CBD3A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE7310 CRYPTO_realloc,21_2_00007FF8A7CE7310
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D03330 CRYPTO_malloc,ERR_new,ERR_set_debug,EVP_CIPHER_CTX_new,ERR_new,ERR_new,ERR_new,ERR_set_debug,EVP_CIPHER_fetch,EVP_CIPHER_get_iv_length,RAND_bytes_ex,EVP_CIPHER_free,EVP_EncryptUpdate,EVP_EncryptFinal,ERR_new,ERR_new,ERR_new,ERR_set_debug,EVP_CIPHER_CTX_get_iv_length,ERR_new,ERR_new,CRYPTO_free,EVP_CIPHER_CTX_free,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,EVP_CIPHER_CTX_free,21_2_00007FF8A7D03330
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C911AE EVP_MAC_CTX_free,CRYPTO_free,21_2_00007FF8A7C911AE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CC52D8 EVP_MAC_CTX_free,CRYPTO_free,21_2_00007FF8A7CC52D8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD3270 CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,21_2_00007FF8A7CD3270
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB9274 CRYPTO_free,EVP_PKEY_free,CRYPTO_free,21_2_00007FF8A7CB9274
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92121 ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,21_2_00007FF8A7C92121
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92478 CRYPTO_memcmp,ERR_new,ERR_set_debug,memchr,ERR_new,CRYPTO_free,CRYPTO_free,CRYPTO_strndup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C92478
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91F91 CRYPTO_free,CRYPTO_malloc,ERR_new,ERR_set_debug,21_2_00007FF8A7C91F91
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9214E EVP_CIPHER_get_mode,EVP_CIPHER_get_mode,EVP_CIPHER_get_iv_length,EVP_CIPHER_get_key_length,CRYPTO_malloc,ERR_new,ERR_set_debug,21_2_00007FF8A7C9214E
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CBF1F0 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,_time64,CRYPTO_THREAD_lock_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,ERR_new,ERR_set_debug,CRYPTO_new_ex_data,CRYPTO_THREAD_lock_free,ERR_new,ERR_set_debug,CRYPTO_free_ex_data,OPENSSL_cleanse,OPENSSL_cleanse,X509_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_clear_free,memcpy,21_2_00007FF8A7CBF1F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91113 EVP_PKEY_free,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_new,ERR_new,ERR_set_debug,EVP_DigestVerifyInit_ex,ERR_new,ERR_set_debug,ERR_new,CRYPTO_free,ERR_new,ERR_set_debug,EVP_MD_CTX_free,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_free,21_2_00007FF8A7C91113
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D03160 CRYPTO_free,CRYPTO_strndup,21_2_00007FF8A7D03160
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C920EF CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C920EF
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CAF100 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,BUF_MEM_free,EVP_MD_CTX_free,X509_free,X509_VERIFY_PARAM_move_peername,CRYPTO_free,21_2_00007FF8A7CAF100
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CFB100 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,21_2_00007FF8A7CFB100
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA40F0 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_THREAD_lock_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,21_2_00007FF8A7CA40F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92734 CRYPTO_free,CRYPTO_strdup,21_2_00007FF8A7C92734
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB6080 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7CB6080
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA60B0 COMP_zlib,OPENSSL_sk_new,COMP_get_type,CRYPTO_malloc,COMP_get_name,OPENSSL_sk_push,OPENSSL_sk_sort,21_2_00007FF8A7CA60B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE80B0 CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CE80B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9107D CRYPTO_free,21_2_00007FF8A7C9107D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA5FD0 OPENSSL_sk_new,COMP_get_type,CRYPTO_malloc,OPENSSL_sk_push,OPENSSL_sk_sort,21_2_00007FF8A7CA5FD0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92400 CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C92400
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB5F90 CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CB5F90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9144C EVP_MD_CTX_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,EVP_MD_CTX_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,memcpy,21_2_00007FF8A7C9144C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91D8E CRYPTO_free,CRYPTO_memdup,21_2_00007FF8A7C91D8E
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91B31 CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C91B31
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CEFF50 CRYPTO_free,CRYPTO_strndup,21_2_00007FF8A7CEFF50
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91ACD ERR_new,ERR_set_debug,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,memcpy,memcpy,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_new,memcpy,ERR_new,memcpy,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C91ACD
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C925A4 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,21_2_00007FF8A7C925A4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF3F10 EVP_MD_CTX_new,EVP_DigestInit,EVP_DigestUpdate,EVP_DigestUpdate,EVP_DigestFinal_ex,EVP_MD_CTX_free,CRYPTO_malloc,EVP_PKEY_CTX_ctrl,EVP_PKEY_encrypt,EVP_PKEY_CTX_free,ERR_new,ERR_set_debug,EVP_PKEY_CTX_free,CRYPTO_clear_free,ERR_new,ERR_set_debug,21_2_00007FF8A7CF3F10
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA7F00 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_malloc,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,strncmp,CRYPTO_free,CRYPTO_free,OPENSSL_sk_new_null,CRYPTO_free,OPENSSL_sk_num,OPENSSL_sk_value,OPENSSL_sk_push,OPENSSL_sk_delete,OPENSSL_sk_num,OPENSSL_sk_push,CRYPTO_free,OPENSSL_sk_free,CRYPTO_free,OPENSSL_sk_free,21_2_00007FF8A7CA7F00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91B18 ERR_new,ERR_set_debug,memset,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,OPENSSL_cleanse,CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_new,ERR_set_debug,OPENSSL_cleanse,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memcmp,ERR_new,ERR_new,21_2_00007FF8A7C91B18
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C93EE0 CRYPTO_free,21_2_00007FF8A7C93EE0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF9E90 ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,CRYPTO_strndup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7CF9E90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C95E4A BIO_get_data,BIO_get_init,BIO_clear_flags,BIO_set_init,CRYPTO_free,CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,BIO_set_init,BIO_clear_flags,BIO_get_data,BIO_set_shutdown,BIO_push,BIO_set_next,BIO_up_ref,BIO_set_init,21_2_00007FF8A7C95E4A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C919E7 CRYPTO_free,21_2_00007FF8A7C919E7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CBDDC0 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,_time64,CRYPTO_THREAD_lock_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_new_ex_data,CRYPTO_THREAD_lock_free,CRYPTO_free,21_2_00007FF8A7CBDDC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9157D CRYPTO_free,CRYPTO_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,BN_free,21_2_00007FF8A7C9157D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C911E0 EVP_PKEY_free,X509_free,EVP_PKEY_free,OPENSSL_sk_pop_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,CRYPTO_free,X509_STORE_free,X509_STORE_free,CRYPTO_free,CRYPTO_THREAD_lock_free,CRYPTO_free,21_2_00007FF8A7C911E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB5DE0 CRYPTO_zalloc,CRYPTO_zalloc,OBJ_nid2sn,EVP_get_digestbyname,CRYPTO_free,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7CB5DE0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9108C ERR_new,ERR_set_debug,CRYPTO_free,21_2_00007FF8A7C9108C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE7DE0 CRYPTO_memdup,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CE7DE0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C925EF CRYPTO_malloc,ERR_new,ERR_set_debug,memcpy,ERR_new,ERR_set_debug,21_2_00007FF8A7C925EF
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9FDB0 ERR_new,ERR_set_debug,EVP_PKEY_CTX_new_from_pkey,CRYPTO_malloc,CRYPTO_malloc,EVP_PKEY_encapsulate,ERR_new,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_clear_free,CRYPTO_free,EVP_PKEY_CTX_free,21_2_00007FF8A7C9FDB0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA9D50 CRYPTO_free,CRYPTO_strdup,21_2_00007FF8A7CA9D50
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9176C CRYPTO_malloc,CRYPTO_THREAD_lock_new,CRYPTO_free,ERR_new,ERR_set_debug,ERR_set_error,X509_up_ref,X509_chain_up_ref,CRYPTO_strdup,CRYPTO_strdup,CRYPTO_dup_ex_data,CRYPTO_strdup,CRYPTO_memdup,CRYPTO_memdup,CRYPTO_strdup,CRYPTO_memdup,21_2_00007FF8A7C9176C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CEFCC0 CRYPTO_free,CRYPTO_memdup,21_2_00007FF8A7CEFCC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92536 CRYPTO_free,CRYPTO_memdup,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7C92536
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA7CB0 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,21_2_00007FF8A7CA7CB0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91087 ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_THREAD_run_once,CRYPTO_THREAD_run_once,CRYPTO_THREAD_run_once,21_2_00007FF8A7C91087
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD3C30 CRYPTO_free,CRYPTO_free,OPENSSL_cleanse,CRYPTO_free,CRYPTO_free,OPENSSL_cleanse,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CD3C30
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CC3B10 CRYPTO_malloc,CRYPTO_realloc,ERR_new,ERR_set_debug,ERR_set_error,memset,OSSL_PARAM_locate_const,CRYPTO_strdup,ERR_new,ERR_set_debug,OSSL_PARAM_locate_const,CRYPTO_strdup,ERR_new,OSSL_PARAM_locate_const,OSSL_PARAM_locate_const,CRYPTO_strdup,ERR_new,OSSL_PARAM_locate_const,OSSL_PARAM_get_uint,OSSL_PARAM_locate_const,OSSL_PARAM_get_uint,ERR_new,OSSL_PARAM_locate_const,OSSL_PARAM_locate_const,OSSL_PARAM_get_int,OSSL_PARAM_locate_const,OSSL_PARAM_get_int,OSSL_PARAM_locate_const,OSSL_PARAM_get_int,ERR_set_mark,EVP_KEYMGMT_free,ERR_pop_to_mark,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_new,ERR_set_debug,ERR_set_error,CRYPTO_free,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7CC3B10
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9FB00 EVP_PKEY_CTX_new_from_pkey,EVP_PKEY_derive_set_peer,EVP_PKEY_is_a,CRYPTO_malloc,ERR_new,ERR_set_debug,EVP_PKEY_derive,ERR_new,ERR_new,ERR_set_debug,CRYPTO_clear_free,EVP_PKEY_CTX_free,ERR_new,ERR_set_debug,21_2_00007FF8A7C9FB00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDFB00 CRYPTO_zalloc,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,21_2_00007FF8A7CDFB00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C912D0 CRYPTO_THREAD_run_once,21_2_00007FF8A7C912D0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CF3A90 ERR_new,ERR_set_debug,X509_get0_pubkey,EVP_PKEY_CTX_new_from_pkey,ERR_new,ERR_set_debug,CRYPTO_malloc,EVP_PKEY_encrypt_init,RAND_bytes_ex,EVP_MD_CTX_new,EVP_DigestInit,EVP_DigestUpdate,EVP_DigestUpdate,EVP_DigestFinal_ex,EVP_MD_CTX_free,EVP_PKEY_CTX_ctrl,EVP_PKEY_encrypt,EVP_PKEY_CTX_free,ERR_new,ERR_set_debug,EVP_PKEY_CTX_free,CRYPTO_clear_free,EVP_MD_CTX_free,21_2_00007FF8A7CF3A90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA1AA0 CRYPTO_free,CRYPTO_strndup,21_2_00007FF8A7CA1AA0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9193D CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,21_2_00007FF8A7C9193D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CFD9E0 CRYPTO_malloc,ERR_new,ERR_set_debug,memcpy,21_2_00007FF8A7CFD9E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91023 ERR_new,ERR_set_debug,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C91023
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C911C2 CRYPTO_malloc,ERR_new,ERR_set_debug,ERR_set_error,memcpy,CRYPTO_free,CRYPTO_free,21_2_00007FF8A7C911C2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD99A0 ERR_new,ERR_set_debug,EVP_MD_CTX_get0_md,EVP_MD_get_size,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_memcmp,ERR_set_mark,ERR_pop_to_mark,ERR_new,ERR_set_debug,ERR_clear_last_mark,EVP_MD_CTX_get0_md,CRYPTO_memcmp,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,ERR_new,ERR_set_debug,CRYPTO_free,21_2_00007FF8A7CD99A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CE1950 ERR_new,ERR_set_debug,EVP_PKEY_get1_encoded_public_key,CRYPTO_free,ERR_new,ERR_set_debug,EVP_PKEY_free,CRYPTO_free,21_2_00007FF8A7CE1950
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDD960 RAND_bytes_ex,CRYPTO_malloc,memset,21_2_00007FF8A7CDD960
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A4C40 i2d_X509,PyBytes_FromStringAndSize,CRYPTO_free,21_2_00007FF8B61A4C40
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A4EC4 ASN1_STRING_type,ASN1_STRING_length,ASN1_STRING_get0_data,_Py_BuildValue_SizeT,ASN1_STRING_to_UTF8,_Py_Dealloc,_Py_BuildValue_SizeT,CRYPTO_free,21_2_00007FF8B61A4EC4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61D18E0 _Py_NoneStruct,_PyArg_UnpackKeywords,PyObject_GetBuffer,PyBuffer_IsContiguous,PyObject_GetBuffer,PyBuffer_IsContiguous,PyLong_AsUnsignedLong,PyLong_AsUnsignedLong,PyLong_AsUnsignedLong,EVP_PBE_scrypt,PyBytes_FromStringAndSize,PyEval_SaveThread,EVP_PBE_scrypt,PyEval_RestoreThread,PyExc_ValueError,PyErr_SetString,PyBuffer_Release,PyBuffer_Release,PyLong_AsLong,PyErr_Occurred,PyLong_AsLong,PyErr_Occurred,PyExc_ValueError,PyExc_ValueError,PyErr_Format,_PyArg_BadArgument,_PyArg_BadArgument,_PyArg_BadArgument,PyExc_TypeError,PyErr_Occurred,PyExc_TypeError,PyErr_Occurred,PyExc_TypeError,PyErr_Occurred,PyExc_TypeError,_PyArg_BadArgument,_PyArg_BadArgument,PyExc_OverflowError,PyExc_OverflowError,_Py_Dealloc,PyExc_ValueError,21_2_00007FF8B61D18E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61D61B8 CRYPTO_memcmp,21_2_00007FF8B61D61B8

                  Bitcoin Miner

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 25.2.Blsvr.exe.7ff667860000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.Blsvr.exe.7ff66787e900.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.Blsvr.exe.7ff66787e900.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Blsvr.exe.7ff758a7e900.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Blsvr.exe.7ff758a7e900.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Blsvr.exe.7ff758a60000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000011.00000002.3255036623.000001F6A91A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.3255036623.000001F6A91C1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.2223523433.00007FF66787B000.00000004.00000001.01000000.0000002C.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Blsvr.exe PID: 1352, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: conhost.exe PID: 5664, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, type: DROPPED
                  Source: global trafficTCP traffic: 192.168.2.5:49705 -> 141.94.96.195:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"44jrwaaoknn1r4rnu5deknqqugdcprxhva5savcaqj1fkzjavwepgvpknogdnrxhub9ba2jepmcxdfbpia8iofxk39pv8bk","pass":"koksal","agent":"xmrig/6.19.0 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2019","rigid":"","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/gpu","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}.
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: losestratum+tcp://
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: cryptonight/0
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: losestratum+tcp://
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: -o, --url=URL URL of mining server
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                  Source: Q3pEXxmWAD.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3270612498.00007FF8B9843000.00000002.00000001.01000000.0000000A.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179620332.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: Q3pEXxmWAD.exe, 00000002.00000002.3270997706.00007FF8B9F70000.00000002.00000001.01000000.00000007.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3268531245.00007FF8B8CE7000.00000002.00000001.01000000.0000000E.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\libssl-3.pdbEE source: Q3pEXxmWAD.exe, 00000002.00000002.3265735287.00007FF8A9355000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PICOpenSSL 3.0.11 19 Sep 20233.0.11built on: Wed Sep 27 22:33:28 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_push_octet_ptrOSSL_PARAM_BLD_to_param..\s\crypto\params.c source: Q3pEXxmWAD.exe, 00000002.00000002.3261455020.00007FF8A8802000.00000002.00000001.01000000.0000000F.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3268916976.00007FF8B8F8C000.00000002.00000001.01000000.0000000C.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162572053.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: Q3pEXxmWAD.exe, 00000002.00000002.3261455020.00007FF8A8802000.00000002.00000001.01000000.0000000F.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3268214204.00007FF8B8CD3000.00000002.00000001.01000000.00000011.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162702885.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3268916976.00007FF8B8F8C000.00000002.00000001.01000000.0000000C.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162572053.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3269818741.00007FF8B908D000.00000002.00000001.01000000.0000000B.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2161613992.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2010863131.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2161410649.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: Q3pEXxmWAD.exe, 00000000.00000003.2010863131.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2161410649.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3270164094.00007FF8B93C8000.00000002.00000001.01000000.00000009.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162790530.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255187711.000002110AE10000.00000002.00000001.01000000.00000006.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\libssl-3.pdb source: Q3pEXxmWAD.exe, 00000002.00000002.3265735287.00007FF8A9355000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: Q3pEXxmWAD.exe, 00000002.00000002.3262655733.00007FF8A8CDF000.00000002.00000001.01000000.00000004.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: Q3pEXxmWAD.exe, 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmp
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A285A0 FindFirstFileExW,FindClose,0_2_00007FF615A285A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A279B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF615A279B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A40B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF615A40B84
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A285A0 FindFirstFileExW,FindClose,2_2_00007FF615A285A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A279B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,2_2_00007FF615A279B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A40B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00007FF615A40B84
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4385A0 FindFirstFileExW,FindClose,20_2_00007FF66D4385A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4379B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,20_2_00007FF66D4379B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D450B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_00007FF66D450B84
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4385A0 FindFirstFileExW,FindClose,21_2_00007FF66D4385A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4379B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,21_2_00007FF66D4379B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D450B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_00007FF66D450B84
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9062E70 memset,PyList_New,SetErrorMode,PyArg_ParseTuple,PyObject_IsTrue,PyEval_SaveThread,GetLogicalDriveStringsA,PyEval_RestoreThread,PyErr_SetFromWindowsErr,SetErrorMode,PyEval_SaveThread,GetDriveTypeA,PyEval_RestoreThread,GetVolumeInformationA,strcat_s,SetLastError,strcat_s,strcat_s,strcat_s,FindFirstVolumeMountPointA,strcpy_s,strcat_s,Py_BuildValue,PyList_Append,_Py_Dealloc,FindNextVolumeMountPointA,FindVolumeMountPointClose,strcat_s,strcat_s,Py_BuildValue,PyList_Append,_Py_Dealloc,strchr,SetErrorMode,FindVolumeMountPointClose,SetErrorMode,_Py_Dealloc,_Py_Dealloc,2_2_00007FF8B9062E70
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2Jump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migrationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\migration\wtrJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\replacementmanifestsJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\migrationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservicesJump to behavior
                  Source: global trafficTCP traffic: 192.168.2.5:49705 -> 141.94.96.195:3333
                  Source: Joe Sandbox ViewIP Address: 141.94.96.195 141.94.96.195
                  Source: Joe Sandbox ViewASN Name: DFNVereinzurFoerderungeinesDeutschenForschungsnetzese DFNVereinzurFoerderungeinesDeutschenForschungsnetzese
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B93C5B08 memset,recvfrom,2_2_00007FF8B93C5B08
                  Source: global trafficDNS traffic detected: DNS query: pool.supportxmr.com
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258134310.000002110BBD0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://.../back.jpeg
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2176734040.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digi
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162572053.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C3F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2016023054.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000002.3253770420.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2166260023.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2166260023.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC78000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2176734040.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C3F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2016023054.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000002.3253770420.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179620332.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: http://crl.globalsign.net/Root.crl0
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C3F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2016023054.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000002.3253770420.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2166260023.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2166260023.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC78000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2176734040.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2179620332.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2162572053.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2166260023.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258134310.000002110BBD0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B6A6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046398537.000002110B7EB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047467606.000002110B6BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://curl.haxx.se/rfc/cookie_spec.html
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://goo.gl/zeJZl.
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B5D6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B5D6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/mail/
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054691134.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3254796752.000002110AB10000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://mail.python.org/pipermail/python-dev/2012-June/120787.html.
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2166260023.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C3F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2016023054.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000002.3253770420.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179620332.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C3F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2016023054.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000002.3253770420.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2166260023.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC78000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2176734040.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257991414.000002110BAD0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2032571621.000002110B005000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110AFBE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032872948.000002110B020000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110B01C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032628407.000002110AFB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2014285116.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2018413031.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2015456056.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2164541880.0000014F8DC7E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2166260023.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046106394.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B5B9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2032571621.000002110B005000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032872948.000002110B020000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110B01C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032721249.000002110ADB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2032571621.000002110B005000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110AFBE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032872948.000002110B020000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110B01C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032628407.000002110AFB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B6A6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B4C0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046398537.000002110B7EB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047467606.000002110B6BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wwwsearch.sf.net/):
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B4E9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257848021.000002110B9C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042702957.000002110B778000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/file/bot
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.tele
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.teleg
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bot
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#Chatshared
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#addstickertoset
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#animation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#answercallbackquery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#answerinlinequery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#answerprecheckoutquery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#answershippingquery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#answerwebappquery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#approvechatjoinrequest
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#audio
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundfill
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040460336.000002110B5C8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundfillfreeformgradient
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundfillgradient
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundfillsolid
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundtype
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundtypechattheme
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040460336.000002110B5C8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B5BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundtypefill
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundtypepattern
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#backgroundtypewallpaper
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#banchatmember
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#banchatsenderchat
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#birthdate
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botcommand
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botcommandscopeallchatadministrators
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botcommandscopeallgroupchats
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botcommandscopeallprivatechats
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botcommandscopechat
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B5BF000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botcommandscopechatadministrators
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botcommandscopechatmember
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botcommandscopedefault
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botdescription
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botname
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#botshortdescription
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#businessconnection
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#businessintro
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#businesslocation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#businessmessagesdeleted
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#businessopeninghours
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#businessopeninghoursinterval
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#callbackquery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chat
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatadministratorrights
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatbackground
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatboost
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatboostadded
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatboostremoved
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatboostsource
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatboostsourcegiftcode
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatboostsourcegiveaway
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatboostsourcepremium
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatboostupdated
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatfullinfo
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatinvitelink
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B5BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatjoinrequest
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatlocation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatmember
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatmemberadministrator
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatmemberbanned
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatmemberleft
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatmembermember
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatmemberowner
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatmemberrestricted
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatmemberupdated
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatpermissions
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#chatphoto
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#choseninlineresult
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#close
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#closeforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AF72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AF72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AF70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043771893.000002110AF70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#closegeneralforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#contact
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#copymessage
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#copymessages
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#createchatinvitelink
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#createforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#createinvoicelink
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#createnewstickerset
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#declinechatjoinrequest
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#deletechatphoto
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#deletechatstickerset
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#deleteforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#deletemessage
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#deletemessages
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#deletemycommands
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#deletestickerfromset
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#deletewebhook
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#dice
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#document
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#editchatinvitelink
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#editforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFF1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFF0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110AFF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#editgeneralforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#editmessagecaption
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#editmessagelivelocation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#editmessagemedia
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#editmessagereplymarkup
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#editmessagetext
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#exportchatinvitelink
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#externalreplyinfo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#file
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#forcereply
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#forumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#forumtopicclosed
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#forumtopiccreated
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#forumtopicedited
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#forumtopicreopened
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#forwardmessage
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#forwardmessages
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#game
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#gamehighscore
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#generalforumtopichidden
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#generalforumtopicunhidden
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AF72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AF72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AF70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043771893.000002110AF70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getbusinessconnection
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFF1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFF0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110AFF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getchat
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getchatadministrators
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFF1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFF0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110AFF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getchatmember
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getchatmembercount
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getchatmenubutton
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getfile
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getforumtopiciconstickers
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getgamehighscores
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getme
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getmycommands
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getmydefaultadministratorrights
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getmydescription
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getmyname
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getmyshortdescription
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getstickerset
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getupdates
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getuserchatboosts
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getuserprofilephotos
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AF72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AF72000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AF70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043771893.000002110AF70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#getwebhookinfo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#giveaway
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#giveawaycompleted
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B6AD000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B6A6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056170973.000002110B6A3000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B6A3000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B6A6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B6A6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047852039.000002110B6A6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B6A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#giveawaywinners
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#hidegeneralforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inaccessiblemessage
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinekeyboardbutton
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinekeyboardmarkup
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresult
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultarticle
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultaudio
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcachedaudio
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcacheddocument
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcachedgif
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcachedmpeg4gif
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcachedphoto
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcachedsticker
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcachedvideo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcachedvoice
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultcontact
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultdocument
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultgame
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultgif
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultlocation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultmpeg4gif
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultphoto
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultsbutton
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultvenue
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultvideo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inlinequeryresultvoice
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputcontactmessagecontent
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputinvoicemessagecontent
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputlocationmessagecontent
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputmediaanimation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputmediaaudio
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputmediadocument
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputmediaphoto
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputmediavideo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047852039.000002110B631000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputpolloption
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputtextmessagecontent
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#inputvenuemessagecontent
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#invoice
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#keyboardbutton
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#keyboardbuttonpolltype
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#keyboardbuttonrequestchat
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#keyboardbuttonrequestusers
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#labeledprice
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#leavechat
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#linkpreviewoptions
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#location
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#loginurl
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFF1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFF0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110AFF1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#logout
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#maskposition
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#menubuttoncommands
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#menubuttondefault
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#menubuttonwebapp
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#message
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#messageautodeletetimerchanged
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#messageentity
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#messageid
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#messageorigin
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AF70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043771893.000002110AF70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#messagereactioncountupdated
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#messagereactionupdated
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#orderinfo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#photosize
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#pinchatmessage
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#poll
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047852039.000002110B631000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#pollanswer
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#polloption
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#precheckoutquery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#promotechatmember
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#proximityalerttriggered
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#reactioncount
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#reactiontype
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#reactiontypecustomemoji
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#reactiontypeemoji
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#reopenforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#reopengeneralforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#replaceStickerInSet
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#replykeyboardmarkup
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#replykeyboardremove
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B69C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#replyparameters
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#restrictchatmember
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#revokech
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#revokechatinvitelink
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendanimation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendaudio
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendchataction
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendcontact
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#senddice
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#senddocument
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendgame
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendinvoice
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendlocation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendmediagroup
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendmessage
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendphoto
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendpoll
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendsticker
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendvenue
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendvideo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendvideonote
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sendvoice
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sentwebappmessage
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setchatadministratorcustomtitle
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039174913.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B58A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setchatdescription
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setchatmenubutton
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setchatpermissions
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setchatphoto
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFDC000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setchatstickerset
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039174913.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B58A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setchattitle
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setgamescore
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFF1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFF0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110AFF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setmessagereaction
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setmycommands
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setmydefaultadministratorrights
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setmydescription
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setmyname
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setmyshortdescription
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFDC000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setstickerpositioninset
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setstickersetthumb
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setstickersetthumbnail
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFDC000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#setwebhook
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#shareduser
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#shippingaddress
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#shippingoption
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#shippingquery
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#sticker
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#stickerset
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#stopmessagelivelocation
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#stoppoll
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#story
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B69C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#successfulpayment
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#textquote
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#unbanchatmember
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFE9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#unbanchatsenderchat
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#unhidegeneralforumtopic
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#unpinAllGeneralForumTopicMessages
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#unpinallchatmessages
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFE9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#unpinallforumtopicmessages
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#unpinchatmessage
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#update
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#uploadsticke/
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#uploadstickerfile
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#user
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#userchatboosts
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#userprofilephotos
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#usersshared
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#venue
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#video
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#videochatended
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#videochatparticipantsinvited
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#videochatscheduled
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3253737288.0000021109040000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#videonote
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#voice
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#webappdata
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#webappinfo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#webhookinfo
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/api#writeaccessallowed
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042772871.000002110B71B000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042702957.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/bots/payments#supported-currencies
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/stickers
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/stickers#animated-sticker-requirements
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://core.telegram.org/stickers#video-sticker-requirements
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2035168608.000002110B07A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2034810962.000002110B073000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://foss.heptapod.net/pypy/pypy/-/issues/3539
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Ousret/charset_normalizer
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3253737288.0000021109078000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031692203.0000021109090000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031195401.00000211090A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B4C0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/eternnoir/pyTelegramBotAPI/tree/master/examples
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2033859203.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036239728.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2033818312.000002110B06A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2035118346.000002110AFAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/giampaolo/psutil/issues/875.
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3254414115.000002110A948000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2031195401.00000211090A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3253737288.0000021109078000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031692203.0000021109090000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031195401.00000211090A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2035347309.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036287140.000002110B07A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036375396.000002110B0FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2035246765.000002110B0FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/issues/86361.
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3253737288.0000021109078000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031692203.0000021109090000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031195401.00000211090A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257991414.000002110BAD0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046217740.000002110B7BF000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054691134.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2048600214.000002110B7C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail/
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046217740.000002110B7BF000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054691134.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2048600214.000002110B7C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html.spec.whatwg.org/multipage/
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2048600214.000002110B7C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258134310.000002110BCA4000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B88A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B6A3000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B4C0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B6A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/get
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/post
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258134310.000002110BBD0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://importlib-resources.readthedocs.io/en/latest/using.html#migrating-from-legacy
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2043771893.000002110AF70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://json.org
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2054691134.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B7B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mahler:8092/site-updates.py
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031865432.000002110ADF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0205/
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3262655733.00007FF8A8CDF000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: https://peps.python.org/pep-0263/
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0506/
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258371309.000002110BD18000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://requests.readthedocs.io
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2033859203.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036239728.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2033818312.000002110B06A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2035118346.000002110AFAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/questions/4457745#4457745.
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://t.me/
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://telegram.org)
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054691134.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B6FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc2388#section-4.4
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046217740.000002110B7BF000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054691134.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2048600214.000002110B7C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257991414.000002110BAD0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3257991414.000002110BAD0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsN
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3262012178.00007FF8A8943000.00000002.00000001.01000000.0000000F.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3265969350.00007FF8A9390000.00000002.00000001.01000000.00000013.sdmpString found in binary or memory: https://www.openssl.org/H
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2054691134.000002110B7B8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B7B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3254414115.000002110A8C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3263139397.00007FF8A8D7D000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.python.org/psf/license/
                  Source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/

                  System Summary

                  barindex
                  Source: 25.2.Blsvr.exe.7ff667860000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: 25.2.Blsvr.exe.7ff667860000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                  Source: 25.2.Blsvr.exe.7ff667860000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                  Source: 5.2.Blsvr.exe.7ff758a60000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: 5.2.Blsvr.exe.7ff758a60000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                  Source: 5.2.Blsvr.exe.7ff758a60000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                  Source: 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: 00000019.00000002.2223523433.00007FF66787B000.00000004.00000001.01000000.0000002C.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: Process Memory Space: Blsvr.exe PID: 1352, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                  Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                  Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9061E90 PyList_New,GetActiveProcessorCount,PyErr_SetFromWindowsErr,_Py_Dealloc,free,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,PyExc_RuntimeError,PyErr_SetString,malloc,PyErr_NoMemory,NtQuerySystemInformation,Py_BuildValue,PyList_Append,_Py_Dealloc,free,_Py_Dealloc,2_2_00007FF8B9061E90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9065850 PyArg_ParseTuple,OpenProcess,GetLastError,NtSetInformationProcess,CloseHandle,_Py_NoneStruct,_Py_NoneStruct,2_2_00007FF8B9065850
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9064D40 PyArg_ParseTuple,OpenProcess,GetLastError,PyObject_IsTrue,NtSuspendProcess,NtResumeProcess,CloseHandle,_Py_NoneStruct,_Py_NoneStruct,2_2_00007FF8B9064D40
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9066640 PyList_New,EnterCriticalSection,GetProcessHeap,HeapAlloc,PyErr_NoMemory,_Py_Dealloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,PyExc_RuntimeError,PyErr_SetString,GetCurrentProcess,DuplicateHandle,PyUnicode_FromWideChar,PyList_Append,_Py_Dealloc,GetProcessHeap,HeapFree,CloseHandle,CloseHandle,GetProcessHeap,HeapFree,_Py_Dealloc,GetProcessHeap,HeapFree,LeaveCriticalSection,2_2_00007FF8B9066640
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9065760 PyArg_ParseTuple,OpenProcess,GetLastError,NtQueryInformationProcess,CloseHandle,Py_BuildValue,2_2_00007FF8B9065760
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9066290 GetProcessHeap,HeapAlloc,GetFileType,SetLastError,NtQueryObject,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,PyErr_NoMemory,GetProcessHeap,HeapFree,2_2_00007FF8B9066290
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9062480 GetActiveProcessorCount,PyErr_SetFromWindowsErr,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,PyExc_RuntimeError,PyErr_SetString,malloc,PyErr_NoMemory,NtQuerySystemInformation,free,malloc,PyErr_NoMemory,NtQuerySystemInformation,malloc,PyErr_NoMemory,NtQuerySystemInformation,free,free,free,free,free,Py_BuildValue,2_2_00007FF8B9062480
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9067480 malloc,NtQuerySystemInformation,free,malloc,PyErr_NoMemory,free,free,2_2_00007FF8B9067480
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9066E80 PyExc_RuntimeError,PyErr_SetString,OpenProcess,GetLastError,NtQueryInformationProcess,CloseHandle,CloseHandle,calloc,PyErr_NoMemory,CloseHandle,NtQueryInformationProcess,calloc,PyErr_NoMemory,free,CloseHandle,wcscpy_s,free,CloseHandle,2_2_00007FF8B9066E80
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9064AB0 PyArg_ParseTuple,OpenProcess,GetLastError,GetProcessHeap,HeapAlloc,NtQueryVirtualMemory,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,NtQueryVirtualMemory,PyExc_RuntimeError,PyErr_SetString,CloseHandle,PyErr_Clear,GetProcessHeap,HeapFree,CloseHandle,GetProcessHeap,HeapFree,CloseHandle,Py_BuildValue,PyErr_NoMemory,CloseHandle,2_2_00007FF8B9064AB0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B90646C0 PyArg_ParseTuple,GetProcessHeap,HeapAlloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,Py_BuildValue,PyUnicode_FromWideChar,GetProcessHeap,HeapFree,PyErr_NoMemory,2_2_00007FF8B90646C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9066AE0 OpenProcess,GetLastError,NtQueryInformationProcess,RtlNtStatusToDosErrorNoTeb,PyErr_SetFromWindowsErrWithFilename,CloseHandle,ReadProcessMemory,GetLastError,CloseHandle,ReadProcessMemory,NtQueryInformationProcess,CloseHandle,ReadProcessMemory,ReadProcessMemory,VirtualQueryEx,GetLastError,PyErr_SetFromWindowsErrWithFilename,CloseHandle,calloc,PyErr_NoMemory,CloseHandle,ReadProcessMemory,GetLastError,CloseHandle,free,CloseHandle,2_2_00007FF8B9066AE0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F1E90 PyList_New,GetActiveProcessorCount,PyErr_SetFromWindowsErr,_Py_Dealloc,free,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,PyExc_RuntimeError,PyErr_SetString,malloc,PyErr_NoMemory,NtQuerySystemInformation,Py_BuildValue,PyList_Append,_Py_Dealloc,free,_Py_Dealloc,21_2_00007FF8B77F1E90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F2480 GetActiveProcessorCount,PyErr_SetFromWindowsErr,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,PyExc_RuntimeError,PyErr_SetString,malloc,PyErr_NoMemory,NtQuerySystemInformation,free,malloc,PyErr_NoMemory,NtQuerySystemInformation,malloc,PyErr_NoMemory,NtQuerySystemInformation,free,free,free,free,free,Py_BuildValue,21_2_00007FF8B77F2480
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F7480 malloc,NtQuerySystemInformation,free,malloc,PyErr_NoMemory,free,free,21_2_00007FF8B77F7480
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F6E80 PyExc_RuntimeError,PyErr_SetString,OpenProcess,GetLastError,NtQueryInformationProcess,CloseHandle,CloseHandle,calloc,PyErr_NoMemory,CloseHandle,NtQueryInformationProcess,calloc,PyErr_NoMemory,free,CloseHandle,wcscpy_s,free,CloseHandle,21_2_00007FF8B77F6E80
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F6290 GetProcessHeap,HeapAlloc,GetFileType,SetLastError,NtQueryObject,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,PyErr_NoMemory,GetProcessHeap,HeapFree,21_2_00007FF8B77F6290
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F4AB0 PyArg_ParseTuple,OpenProcess,GetLastError,GetProcessHeap,HeapAlloc,NtQueryVirtualMemory,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,NtQueryVirtualMemory,PyExc_RuntimeError,PyErr_SetString,CloseHandle,PyErr_Clear,GetProcessHeap,HeapFree,CloseHandle,GetProcessHeap,HeapFree,CloseHandle,Py_BuildValue,PyErr_NoMemory,CloseHandle,21_2_00007FF8B77F4AB0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F46C0 PyArg_ParseTuple,GetProcessHeap,HeapAlloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,Py_BuildValue,PyUnicode_FromWideChar,GetProcessHeap,HeapFree,PyErr_NoMemory,21_2_00007FF8B77F46C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F6AE0 OpenProcess,GetLastError,NtQueryInformationProcess,RtlNtStatusToDosErrorNoTeb,PyErr_SetFromWindowsErrWithFilename,CloseHandle,ReadProcessMemory,GetLastError,CloseHandle,ReadProcessMemory,NtQueryInformationProcess,CloseHandle,ReadProcessMemory,ReadProcessMemory,VirtualQueryEx,GetLastError,PyErr_SetFromWindowsErrWithFilename,CloseHandle,calloc,PyErr_NoMemory,CloseHandle,ReadProcessMemory,GetLastError,CloseHandle,free,CloseHandle,21_2_00007FF8B77F6AE0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F4D40 PyArg_ParseTuple,OpenProcess,GetLastError,PyObject_IsTrue,NtSuspendProcess,NtResumeProcess,CloseHandle,_Py_NoneStruct,_Py_NoneStruct,21_2_00007FF8B77F4D40
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F6640 PyList_New,EnterCriticalSection,GetProcessHeap,HeapAlloc,PyErr_NoMemory,_Py_Dealloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,NtQuerySystemInformation,GetProcessHeap,HeapFree,PyExc_RuntimeError,PyErr_SetString,GetCurrentProcess,DuplicateHandle,PyUnicode_FromWideChar,PyList_Append,_Py_Dealloc,GetProcessHeap,HeapFree,CloseHandle,CloseHandle,GetProcessHeap,HeapFree,_Py_Dealloc,GetProcessHeap,HeapFree,LeaveCriticalSection,21_2_00007FF8B77F6640
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F5850 PyArg_ParseTuple,OpenProcess,GetLastError,NtSetInformationProcess,CloseHandle,_Py_NoneStruct,_Py_NoneStruct,21_2_00007FF8B77F5850
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F5760 PyArg_ParseTuple,OpenProcess,GetLastError,NtQueryInformationProcess,CloseHandle,Py_BuildValue,21_2_00007FF8B77F5760
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9062B00: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle,2_2_00007FF8B9062B00
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeFile created: C:\Users\user\AppData\Roaming\Google\Libs\WR64.sysJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A44F100_2_00007FF615A44F10
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A210000_2_00007FF615A21000
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A45C740_2_00007FF615A45C74
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A457280_2_00007FF615A45728
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A31F300_2_00007FF615A31F30
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A3FBD80_2_00007FF615A3FBD8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A42F200_2_00007FF615A42F20
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A30E700_2_00007FF615A30E70
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A295FB0_2_00007FF615A295FB
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A3CD6C0_2_00007FF615A3CD6C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A328C00_2_00007FF615A328C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A310740_2_00007FF615A31074
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A350400_2_00007FF615A35040
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A3D8800_2_00007FF615A3D880
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A29FCD0_2_00007FF615A29FCD
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A2979B0_2_00007FF615A2979B
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A28B200_2_00007FF615A28B20
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A30A600_2_00007FF615A30A60
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A48A380_2_00007FF615A48A38
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A37AAC0_2_00007FF615A37AAC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A312800_2_00007FF615A31280
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A3D2000_2_00007FF615A3D200
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A391B00_2_00007FF615A391B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A4518C0_2_00007FF615A4518C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A32CC40_2_00007FF615A32CC4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A30C640_2_00007FF615A30C64
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A314840_2_00007FF615A31484
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A373F40_2_00007FF615A373F4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A3FBD80_2_00007FF615A3FBD8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A433BC0_2_00007FF615A433BC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A40B840_2_00007FF615A40B84
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A210002_2_00007FF615A21000
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A45C742_2_00007FF615A45C74
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A457282_2_00007FF615A45728
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A31F302_2_00007FF615A31F30
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A3FBD82_2_00007FF615A3FBD8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A42F202_2_00007FF615A42F20
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A44F102_2_00007FF615A44F10
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A30E702_2_00007FF615A30E70
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A295FB2_2_00007FF615A295FB
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A3CD6C2_2_00007FF615A3CD6C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A328C02_2_00007FF615A328C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A310742_2_00007FF615A31074
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A350402_2_00007FF615A35040
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A3D8802_2_00007FF615A3D880
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A29FCD2_2_00007FF615A29FCD
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A2979B2_2_00007FF615A2979B
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A28B202_2_00007FF615A28B20
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A30A602_2_00007FF615A30A60
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A48A382_2_00007FF615A48A38
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A37AAC2_2_00007FF615A37AAC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A312802_2_00007FF615A31280
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A3D2002_2_00007FF615A3D200
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A391B02_2_00007FF615A391B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A4518C2_2_00007FF615A4518C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A32CC42_2_00007FF615A32CC4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A30C642_2_00007FF615A30C64
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A314842_2_00007FF615A31484
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A373F42_2_00007FF615A373F4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A3FBD82_2_00007FF615A3FBD8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A433BC2_2_00007FF615A433BC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A40B842_2_00007FF615A40B84
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9308AA02_2_00007FF8A9308AA0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1A0F2_2_00007FF8A92D1A0F
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1CC12_2_00007FF8A92D1CC1
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D16FE2_2_00007FF8A92D16FE
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D8BE02_2_00007FF8A92D8BE0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D143D2_2_00007FF8A92D143D
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A933CDA02_2_00007FF8A933CDA0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D27162_2_00007FF8A92D2716
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D11812_2_00007FF8A92D1181
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D16132_2_00007FF8A92D1613
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D262B2_2_00007FF8A92D262B
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D17F82_2_00007FF8A92D17F8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9310F902_2_00007FF8A9310F90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F62902_2_00007FF8A92F6290
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1AD72_2_00007FF8A92D1AD7
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1EE72_2_00007FF8A92D1EE7
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1D982_2_00007FF8A92D1D98
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1B542_2_00007FF8A92D1B54
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A934A7402_2_00007FF8A934A740
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D11722_2_00007FF8A92D1172
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1FE62_2_00007FF8A92D1FE6
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931D9602_2_00007FF8A931D960
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93199A02_2_00007FF8A93199A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A931DE302_2_00007FF8A931DE30
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D15412_2_00007FF8A92D1541
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D15912_2_00007FF8A92D1591
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A9315DC02_2_00007FF8A9315DC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92FBD802_2_00007FF8A92FBD80
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D21F32_2_00007FF8A92D21F3
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D24EB2_2_00007FF8A92D24EB
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D149C2_2_00007FF8A92D149C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D13DE2_2_00007FF8A92D13DE
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A93433302_2_00007FF8A9343330
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92E76302_2_00007FF8A92E7630
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D21D52_2_00007FF8A92D21D5
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1C122_2_00007FF8A92D1C12
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D15552_2_00007FF8A92D1555
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B7DE18A02_2_00007FF8B7DE18A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8AFBDA02_2_00007FF8B8AFBDA0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8AFFDC02_2_00007FF8B8AFFDC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B289E02_2_00007FF8B8B289E0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B2576C2_2_00007FF8B8B2576C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B2A0FC2_2_00007FF8B8B2A0FC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B283242_2_00007FF8B8B28324
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B29ABC2_2_00007FF8B8B29ABC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B296C42_2_00007FF8B8B296C4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B2B6D02_2_00007FF8B8B2B6D0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B2A4482_2_00007FF8B8B2A448
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CE18E02_2_00007FF8B8CE18E0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CE12B02_2_00007FF8B8CE12B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CE10002_2_00007FF8B8CE1000
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F76E4C2_2_00007FF8B8F76E4C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F712B02_2_00007FF8B8F712B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F725202_2_00007FF8B8F72520
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F75C902_2_00007FF8B8F75C90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F7F8CC2_2_00007FF8B8F7F8CC
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F78CE02_2_00007FF8B8F78CE0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F753602_2_00007FF8B8F75360
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F71BA02_2_00007FF8B8F71BA0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F72FD02_2_00007FF8B8F72FD0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9061E902_2_00007FF8B9061E90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9062B002_2_00007FF8B9062B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9064E302_2_00007FF8B9064E30
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B90666402_2_00007FF8B9066640
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9069A402_2_00007FF8B9069A40
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9062E702_2_00007FF8B9062E70
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B90639702_2_00007FF8B9063970
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9068FA02_2_00007FF8B9068FA0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B90810002_2_00007FF8B9081000
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B908C7882_2_00007FF8B908C788
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9083E802_2_00007FF8B9083E80
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9082EC02_2_00007FF8B9082EC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9083BF02_2_00007FF8B9083BF0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B93C10602_2_00007FF8B93C1060
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9F62E402_2_00007FF8B9F62E40
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8BA247CA02_2_00007FF8BA247CA0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8BFAB27A02_2_00007FF8BFAB27A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8BFAB39F02_2_00007FF8BFAB39F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D454F1020_2_00007FF66D454F10
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D43100020_2_00007FF66D431000
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D455C7420_2_00007FF66D455C74
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44FBD820_2_00007FF66D44FBD8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D440E7020_2_00007FF66D440E70
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D45572820_2_00007FF66D455728
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D441F3020_2_00007FF66D441F30
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44FBD820_2_00007FF66D44FBD8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D452F2020_2_00007FF66D452F20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44CD6C20_2_00007FF66D44CD6C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4395FB20_2_00007FF66D4395FB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44D88020_2_00007FF66D44D880
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44504020_2_00007FF66D445040
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44107420_2_00007FF66D441074
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4428C020_2_00007FF66D4428C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D43979B20_2_00007FF66D43979B
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D439FCD20_2_00007FF66D439FCD
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44128020_2_00007FF66D441280
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D447AAC20_2_00007FF66D447AAC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D458A3820_2_00007FF66D458A38
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D440A6020_2_00007FF66D440A60
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D438B2020_2_00007FF66D438B20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D45518C20_2_00007FF66D45518C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4491B020_2_00007FF66D4491B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44D20020_2_00007FF66D44D200
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D44148420_2_00007FF66D441484
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D440C6420_2_00007FF66D440C64
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D442CC420_2_00007FF66D442CC4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D450B8420_2_00007FF66D450B84
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4533BC20_2_00007FF66D4533BC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4473F420_2_00007FF66D4473F4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D43100021_2_00007FF66D431000
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D455C7421_2_00007FF66D455C74
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D440E7021_2_00007FF66D440E70
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D454F1021_2_00007FF66D454F10
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D45572821_2_00007FF66D455728
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D441F3021_2_00007FF66D441F30
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44FBD821_2_00007FF66D44FBD8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D452F2021_2_00007FF66D452F20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44CD6C21_2_00007FF66D44CD6C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4395FB21_2_00007FF66D4395FB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44D88021_2_00007FF66D44D880
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44504021_2_00007FF66D445040
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44107421_2_00007FF66D441074
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4428C021_2_00007FF66D4428C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D43979B21_2_00007FF66D43979B
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D439FCD21_2_00007FF66D439FCD
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44128021_2_00007FF66D441280
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D447AAC21_2_00007FF66D447AAC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D458A3821_2_00007FF66D458A38
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D440A6021_2_00007FF66D440A60
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D438B2021_2_00007FF66D438B20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D45518C21_2_00007FF66D45518C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4491B021_2_00007FF66D4491B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44D20021_2_00007FF66D44D200
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44148421_2_00007FF66D441484
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D440C6421_2_00007FF66D440C64
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D442CC421_2_00007FF66D442CC4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D450B8421_2_00007FF66D450B84
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4533BC21_2_00007FF66D4533BC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4473F421_2_00007FF66D4473F4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D44FBD821_2_00007FF66D44FBD8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91B5421_2_00007FF8A7C91B54
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9117221_2_00007FF8A7C91172
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D0A74021_2_00007FF8A7D0A740
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91D9821_2_00007FF8A7C91D98
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91EE721_2_00007FF8A7C91EE7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB629021_2_00007FF8A7CB6290
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91AD721_2_00007FF8A7C91AD7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9118121_2_00007FF8A7C91181
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9271621_2_00007FF8A7C92716
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD0F9021_2_00007FF8A7CD0F90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C917F821_2_00007FF8A7C917F8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9262B21_2_00007FF8A7C9262B
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9161321_2_00007FF8A7C91613
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9143D21_2_00007FF8A7C9143D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CFCDA021_2_00007FF8A7CFCDA0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C98BE021_2_00007FF8A7C98BE0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C916FE21_2_00007FF8A7C916FE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CC8AA021_2_00007FF8A7CC8AA0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91A0F21_2_00007FF8A7C91A0F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91CC121_2_00007FF8A7C91CC1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9155521_2_00007FF8A7C91555
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C921D521_2_00007FF8A7C921D5
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91C1221_2_00007FF8A7C91C12
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CA763021_2_00007FF8A7CA7630
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C913DE21_2_00007FF8A7C913DE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D0333021_2_00007FF8A7D03330
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C924EB21_2_00007FF8A7C924EB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9149C21_2_00007FF8A7C9149C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C921F321_2_00007FF8A7C921F3
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9154121_2_00007FF8A7C91541
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C9159121_2_00007FF8A7C91591
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDDE3021_2_00007FF8A7CDDE30
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD5DC021_2_00007FF8A7CD5DC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CBBD8021_2_00007FF8A7CBBD80
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91FE621_2_00007FF8A7C91FE6
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CD99A021_2_00007FF8A7CD99A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CDD96021_2_00007FF8A7CDD960
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D618A021_2_00007FF8A7D618A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B617BDA021_2_00007FF8B617BDA0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B617FDC021_2_00007FF8B617FDC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A832421_2_00007FF8B61A8324
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61AA0FC21_2_00007FF8B61AA0FC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A576C21_2_00007FF8B61A576C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A89E021_2_00007FF8B61A89E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61AA44821_2_00007FF8B61AA448
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A96C421_2_00007FF8B61A96C4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A9ABC21_2_00007FF8B61A9ABC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61AB6D021_2_00007FF8B61AB6D0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61D100021_2_00007FF8B61D1000
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61D12B021_2_00007FF8B61D12B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61D18E021_2_00007FF8B61D18E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61F536021_2_00007FF8B61F5360
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61F1BA021_2_00007FF8B61F1BA0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61F2FD021_2_00007FF8B61F2FD0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61F5C9021_2_00007FF8B61F5C90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61F8CE021_2_00007FF8B61F8CE0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61FF8CC21_2_00007FF8B61FF8CC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61F252021_2_00007FF8B61F2520
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61F6E4C21_2_00007FF8B61F6E4C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61F12B021_2_00007FF8B61F12B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F1E9021_2_00007FF8B77F1E90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F8FA021_2_00007FF8B77F8FA0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F2B0021_2_00007FF8B77F2B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F4E3021_2_00007FF8B77F4E30
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F664021_2_00007FF8B77F6640
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F9A4021_2_00007FF8B77F9A40
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F2E7021_2_00007FF8B77F2E70
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F397021_2_00007FF8B77F3970
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B781C78821_2_00007FF8B781C788
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B7813E8021_2_00007FF8B7813E80
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B7812EC021_2_00007FF8B7812EC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B7813BF021_2_00007FF8B7813BF0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B781100021_2_00007FF8B7811000
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B783106021_2_00007FF8B7831060
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B7FE2E4021_2_00007FF8B7FE2E40
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8007CA021_2_00007FF8B8007CA0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8CB2ED021_2_00007FF8B8CB2ED0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8CB39F021_2_00007FF8B8CB39F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8CB32E021_2_00007FF8B8CB32E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8CB27A021_2_00007FF8B8CB27A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8CB3F5021_2_00007FF8B8CB3F50
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8CB1F5021_2_00007FF8B8CB1F50
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\_MEI50042\VCRUNTIME140.dll 4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\_MEI50042\_bz2.pyd AB34B804DA5B8E814B2178754D095A4E8AEAD77EEFD3668DA188769392CDB5F4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8B6173700 appears 51 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8A7D0D545 appears 39 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8A7D0D551 appears 69 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8A7D0CE79 appears 49 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8A7D0CF69 appears 31 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8A7D0CDA1 appears 1190 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF66D432760 appears 36 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8A7C9132A appears 473 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8B77F1070 appears 43 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF66D4325F0 appears 100 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8B77F1D70 appears 39 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8A7D0CD8F appears 331 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8B6173770 appears 96 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: String function: 00007FF8A7D0CD9B appears 39 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8B9061D70 appears 39 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8A934CD8F appears 331 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8B8AF3770 appears 96 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8A934CD9B appears 39 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8B8AF3700 appears 51 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF615A22760 appears 36 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8A934CE79 appears 49 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8A934D545 appears 39 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8A934D551 appears 69 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8A934CF69 appears 31 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF615A225F0 appears 100 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8B9061070 appears 43 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8A92D132A appears 473 times
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: String function: 00007FF8A934CDA1 appears 1190 times
                  Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: unicodedata.pyd.20.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: Blsvr.exe.0.drStatic PE information: Number of sections : 11 > 10
                  Source: Blsvr.exe.20.drStatic PE information: Number of sections : 11 > 10
                  Source: python3.dll.0.drStatic PE information: No import functions for PE file found
                  Source: python3.dll.20.drStatic PE information: No import functions for PE file found
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2015648892.0000011C08C33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibsslH vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011460255.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011241403.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2012314473.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2010863131.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exeBinary or memory string: OriginalFilename vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3262012178.00007FF8A8943000.00000002.00000001.01000000.0000000F.sdmpBinary or memory string: OriginalFilenamelibcryptoH vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3270351890.00007FF8B93D2000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3268332330.00007FF8B8CD6000.00000002.00000001.01000000.00000011.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3270760465.00007FF8B9846000.00000002.00000001.01000000.0000000A.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3265353837.00007FF8A8F1D000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenamepython311.dll. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3265969350.00007FF8A9390000.00000002.00000001.01000000.00000013.sdmpBinary or memory string: OriginalFilenamelibsslH vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3268675265.00007FF8B8CEE000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3255187711.000002110AE10000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3269150936.00007FF8B8F95000.00000002.00000001.01000000.0000000C.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3269933758.00007FF8B9092000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3271125547.00007FF8B9F7D000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepython3.dll. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2161410649.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2161613992.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2162702885.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2179620332.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2162240783.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2162790530.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2162921981.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2161831068.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exe, 00000014.00000003.2162572053.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs Q3pEXxmWAD.exe
                  Source: Q3pEXxmWAD.exeBinary or memory string: OriginalFilename vs Q3pEXxmWAD.exe
                  Source: 25.2.Blsvr.exe.7ff667860000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: 25.2.Blsvr.exe.7ff667860000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                  Source: 25.2.Blsvr.exe.7ff667860000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                  Source: 25.2.Blsvr.exe.7ff66787e900.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.raw.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                  Source: 5.2.Blsvr.exe.7ff758a7e900.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                  Source: 5.2.Blsvr.exe.7ff758a60000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: 5.2.Blsvr.exe.7ff758a60000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                  Source: 5.2.Blsvr.exe.7ff758a60000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                  Source: 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: 00000019.00000002.2223523433.00007FF66787B000.00000004.00000001.01000000.0000002C.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: Process Memory Space: Blsvr.exe PID: 1352, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                  Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                  Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                  Source: classification engineClassification label: mal100.adwa.spyw.evad.mine.winEXE@67/73@1/1
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A229E0 GetLastError,FormatMessageW,MessageBoxW,0_2_00007FF615A229E0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9067E20 GetCurrentProcess,OpenProcessToken,GetLastError,ImpersonateSelf,OpenProcessToken,GetLastError,PyErr_SetFromWindowsErrWithFilename,LookupPrivilegeValueA,GetLastError,PyErr_SetFromWindowsErrWithFilename,AdjustTokenPrivileges,GetLastError,PyErr_SetFromWindowsErrWithFilename,AdjustTokenPrivileges,RevertToSelf,FindCloseChangeNotification,2_2_00007FF8B9067E20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77F7E20 GetCurrentProcess,OpenProcessToken,GetLastError,ImpersonateSelf,OpenProcessToken,GetLastError,PyErr_SetFromWindowsErrWithFilename,LookupPrivilegeValueA,GetLastError,PyErr_SetFromWindowsErrWithFilename,AdjustTokenPrivileges,GetLastError,PyErr_SetFromWindowsErrWithFilename,AdjustTokenPrivileges,RevertToSelf,FindCloseChangeNotification,21_2_00007FF8B77F7E20
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9062A30 PyArg_ParseTuple,PyUnicode_AsWideCharString,PyEval_SaveThread,GetDiskFreeSpaceExW,PyEval_RestoreThread,PyMem_Free,PyExc_OSError,PyErr_SetExcFromWindowsErrWithFilenameObject,Py_BuildValue,2_2_00007FF8B9062A30
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9064E30 PyList_New,PyArg_ParseTuple,CreateToolhelp32Snapshot,_Py_Dealloc,CloseHandle,CloseHandle,Thread32First,OpenThread,GetThreadTimes,Py_BuildValue,PyList_Append,_Py_Dealloc,CloseHandle,Thread32Next,CloseHandle,_Py_Dealloc,2_2_00007FF8B9064E30
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9068B10 PyArg_ParseTuple,StartServiceA,CloseServiceHandle,CloseServiceHandle,_Py_NoneStruct,_Py_NoneStruct,2_2_00007FF8B9068B10
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5672:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Global\hmnpullauvvpicnk
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7096:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4676:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7044:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2612:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2804:120:WilError_03
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042Jump to behavior
                  Source: Q3pEXxmWAD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name=&quot;csrss.exe&quot;
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Q3pEXxmWAD.exeReversingLabs: Detection: 36%
                  Source: Q3pEXxmWAD.exeVirustotal: Detection: 44%
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile read: C:\Users\user\Desktop\Q3pEXxmWAD.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Q3pEXxmWAD.exe "C:\Users\user\Desktop\Q3pEXxmWAD.exe"
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess created: C:\Users\user\Desktop\Q3pEXxmWAD.exe "C:\Users\user\Desktop\Q3pEXxmWAD.exe"
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe
                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exe
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe"
                  Source: C:\Windows\System32\sc.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe"
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe
                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess created: C:\Users\user\Desktop\Q3pEXxmWAD.exe "C:\Users\user\Desktop\Q3pEXxmWAD.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: libffi-8.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: libcrypto-3.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: libssl-3.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: libffi-8.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: libcrypto-3.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: libssl-3.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
                  Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: Q3pEXxmWAD.exeStatic PE information: Image base 0x140000000 > 0x60000000
                  Source: Q3pEXxmWAD.exeStatic file information: File size 12945034 > 1048576
                  Source: Q3pEXxmWAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: Q3pEXxmWAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: Q3pEXxmWAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: Q3pEXxmWAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Q3pEXxmWAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: Q3pEXxmWAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: Q3pEXxmWAD.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                  Source: Q3pEXxmWAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2019779670.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3270612498.00007FF8B9843000.00000002.00000001.01000000.0000000A.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179334176.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2020000570.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2179620332.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: Q3pEXxmWAD.exe, 00000002.00000002.3270997706.00007FF8B9F70000.00000002.00000001.01000000.00000007.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2011704965.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3268531245.00007FF8B8CE7000.00000002.00000001.01000000.0000000E.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162439227.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\libssl-3.pdbEE source: Q3pEXxmWAD.exe, 00000002.00000002.3265735287.00007FF8A9355000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PICOpenSSL 3.0.11 19 Sep 20233.0.11built on: Wed Sep 27 22:33:28 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_push_octet_ptrOSSL_PARAM_BLD_to_param..\s\crypto\params.c source: Q3pEXxmWAD.exe, 00000002.00000002.3261455020.00007FF8A8802000.00000002.00000001.01000000.0000000F.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3268916976.00007FF8B8F8C000.00000002.00000001.01000000.0000000C.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162572053.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: Q3pEXxmWAD.exe, 00000002.00000002.3261455020.00007FF8A8802000.00000002.00000001.01000000.0000000F.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2012028458.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3268214204.00007FF8B8CD3000.00000002.00000001.01000000.00000011.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162702885.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: Blsvr.exe, 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2011882505.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3268916976.00007FF8B8F8C000.00000002.00000001.01000000.0000000C.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162572053.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2011057798.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3269818741.00007FF8B908D000.00000002.00000001.01000000.0000000B.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2161613992.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2010863131.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2161410649.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: Q3pEXxmWAD.exe, 00000000.00000003.2010863131.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2161410649.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2012157129.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3270164094.00007FF8B93C8000.00000002.00000001.01000000.00000009.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2162790530.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: Q3pEXxmWAD.exe, 00000000.00000003.2017725547.0000011C08C33000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255187711.000002110AE10000.00000002.00000001.01000000.00000006.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2171482969.0000014F8DC72000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\libssl-3.pdb source: Q3pEXxmWAD.exe, 00000002.00000002.3265735287.00007FF8A9355000.00000002.00000001.01000000.00000013.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: Q3pEXxmWAD.exe, 00000002.00000002.3262655733.00007FF8A8CDF000.00000002.00000001.01000000.00000004.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: Q3pEXxmWAD.exe, 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmp
                  Source: Q3pEXxmWAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: Q3pEXxmWAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: Q3pEXxmWAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: Q3pEXxmWAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: Q3pEXxmWAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: libcrypto-3.dll.0.drStatic PE information: section name: .00cfg
                  Source: libssl-3.dll.0.drStatic PE information: section name: .00cfg
                  Source: Blsvr.exe.0.drStatic PE information: section name: .xdata
                  Source: VCRUNTIME140.dll.0.drStatic PE information: section name: fothk
                  Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
                  Source: python311.dll.0.drStatic PE information: section name: PyRuntim
                  Source: uyfkrbdwixpr.tmp.5.drStatic PE information: section name: _RANDOMX
                  Source: uyfkrbdwixpr.tmp.5.drStatic PE information: section name: _TEXT_CN
                  Source: uyfkrbdwixpr.tmp.5.drStatic PE information: section name: _TEXT_CN
                  Source: uyfkrbdwixpr.tmp.5.drStatic PE information: section name: _RDATA
                  Source: libcrypto-3.dll.20.drStatic PE information: section name: .00cfg
                  Source: libssl-3.dll.20.drStatic PE information: section name: .00cfg
                  Source: python311.dll.20.drStatic PE information: section name: PyRuntim
                  Source: Blsvr.exe.20.drStatic PE information: section name: .xdata
                  Source: VCRUNTIME140.dll.20.drStatic PE information: section name: fothk
                  Source: VCRUNTIME140.dll.20.drStatic PE information: section name: _RDATA
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92F4541 push rcx; ret 2_2_00007FF8A92F4542
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D1D7B push rcx; retf 2_2_00007FF8A92D1D7C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7CB4541 push rcx; ret 21_2_00007FF8A7CB4542
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C91D7B push rcx; retf 21_2_00007FF8A7C91D7C

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, \\.\PhysicalDrive%d2_2_00007FF8B9062B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, PhysicalDrive%i2_2_00007FF8B9062B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, DeviceIoControl -> ERROR_INVALID_FUNCTION; ignore PhysicalDrive%i2_2_00007FF8B9062B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, DeviceIoControl -> ERROR_NOT_SUPPORTED; ignore PhysicalDrive%i2_2_00007FF8B9062B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, \\.\PhysicalDrive%d21_2_00007FF8B77F2B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, PhysicalDrive%i21_2_00007FF8B77F2B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, DeviceIoControl -> ERROR_INVALID_FUNCTION; ignore PhysicalDrive%i21_2_00007FF8B77F2B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, DeviceIoControl -> ERROR_NOT_SUPPORTED; ignore PhysicalDrive%i21_2_00007FF8B77F2B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess created: "C:\Users\user\Desktop\Q3pEXxmWAD.exe"
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeProcess created: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe"
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeFile created: C:\Users\user\AppData\Roaming\Google\Libs\WR64.sysJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\_decimal.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\python311.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\_lzma.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\libffi-8.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\python3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\libssl-3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\_bz2.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\psutil\_psutil_windows.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\_ssl.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\select.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\_decimal.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer\md__mypyc.cp311-win_amd64.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\psutil\_psutil_windows.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\python3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\VCRUNTIME140.dllJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\_queue.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\VCRUNTIME140.dllJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\_ssl.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeFile created: C:\Users\user\AppData\Roaming\Google\Libs\WR64.sysJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\_queue.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\_socket.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\select.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\_bz2.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\_lzma.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeFile created: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\libffi-8.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\python311.dllJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer\md.cp311-win_amd64.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\charset_normalizer\md__mypyc.cp311-win_amd64.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI50042\libssl-3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\charset_normalizer\md.cp311-win_amd64.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI63882\_socket.pydJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, \\.\PhysicalDrive%d2_2_00007FF8B9062B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, PhysicalDrive%i2_2_00007FF8B9062B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, DeviceIoControl -> ERROR_INVALID_FUNCTION; ignore PhysicalDrive%i2_2_00007FF8B9062B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, DeviceIoControl -> ERROR_NOT_SUPPORTED; ignore PhysicalDrive%i2_2_00007FF8B9062B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, \\.\PhysicalDrive%d21_2_00007FF8B77F2B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, PhysicalDrive%i21_2_00007FF8B77F2B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, DeviceIoControl -> ERROR_INVALID_FUNCTION; ignore PhysicalDrive%i21_2_00007FF8B77F2B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyDict_New,swprintf_s,CreateFileA,DeviceIoControl,GetLastError,DeviceIoControl,swprintf_s,Py_BuildValue,PyDict_SetItemString,_Py_Dealloc,CloseHandle,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,__acrt_iob_func,fprintf,GetLastError,__acrt_iob_func,fprintf,__acrt_iob_func,PyErr_SetFromWindowsErr,_Py_Dealloc,_Py_Dealloc,CloseHandle, DeviceIoControl -> ERROR_NOT_SUPPORTED; ignore PhysicalDrive%i21_2_00007FF8B77F2B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9068B10 PyArg_ParseTuple,StartServiceA,CloseServiceHandle,CloseServiceHandle,_Py_NoneStruct,_Py_NoneStruct,2_2_00007FF8B9068B10
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\UYFKRBDWIXPR.TMP
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A26EA0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF615A26EA0
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: conhost.exe, 00000011.00000002.3255582203.000001F6AABF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                  Source: conhost.exe, 00000011.00000002.3255036623.000001F6A91A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: KZJAVWEPGVPKNOGDNRXHUB9BA2JEPMCXDFBPIA8IOFXK39PV8BK" --PASS="KOKSAL" --CPU-MAX-THREADS-HINT=30 --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-VERSION="3.2.0" --CINIT-IDLE-WAIT=15 --CINIT-IDLE-CPU=80 --CINIT-ID="HMNPULLAUVVPICNK"
                  Source: conhost.exe, 00000011.00000002.3255036623.000001F6A91A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                  Source: conhost.exe, 00000011.00000002.3255036623.000001F6A91A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\SYSTEM32\CONHOST.EXE--ALGO=RX/0--URL=POOL.SUPPORTXMR.COM:3333--USER=44JRWAAOKNN1R4RNU5DEKNQQUGDCPRXHVA5SAVCAQJ1FKZJAVWEPGVPKNOGDNRXHUB9BA2JEPMCXDFBPIA8IOFXK39PV8BK--PASS=KOKSAL--CPU-MAX-THREADS-HINT=30--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-VERSION=3.2.0--CINIT-IDLE-WAIT=15--CINIT-IDLE-CPU=80--CINIT-ID=HMNPULLAUVVPICNK
                  Source: conhost.exe, 00000011.00000002.3255036623.000001F6A91A6000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 00000011.00000002.3255582203.000001F6AABF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
                  Source: conhost.exe, 00000011.00000002.3255036623.000001F6A91A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: KZJAVWEPGVPKNOGDNRXHUB9BA2JEPMCXDFBPIA8IOFXK39PV8BK" --PASS="KOKSAL" --CPU-MAX-THREADS-HINT=30 --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-VERSION="3.2.0" --CINIT-IDLE-WAIT=15 --CINIT-IDLE-CPU=80 --CINIT-ID="HMNPULLAUVVPICNK"ZZ
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: PyList_New,OpenSCManagerA,GetLastError,PyErr_SetFromWindowsErrWithFilename,EnumServicesStatusExW,GetLastError,free,malloc,EnumServicesStatusExW,PyUnicode_FromWideChar,PyUnicode_FromWideChar,Py_BuildValue,PyList_Append,_Py_Dealloc,_Py_Dealloc,_Py_Dealloc,CloseServiceHandle,free,_Py_Dealloc,_Py_Dealloc,_Py_Dealloc,_Py_Dealloc,CloseServiceHandle,free,2_2_00007FF8B90681E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: PyList_New,OpenSCManagerA,GetLastError,PyErr_SetFromWindowsErrWithFilename,EnumServicesStatusExW,GetLastError,free,malloc,EnumServicesStatusExW,PyUnicode_FromWideChar,PyUnicode_FromWideChar,Py_BuildValue,PyList_Append,_Py_Dealloc,_Py_Dealloc,_Py_Dealloc,CloseServiceHandle,free,_Py_Dealloc,_Py_Dealloc,_Py_Dealloc,_Py_Dealloc,CloseServiceHandle,free,21_2_00007FF8B77F81E0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\python311.dllJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\_decimal.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\_lzma.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\python3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\_bz2.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\psutil\_psutil_windows.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\_ssl.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\select.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\_decimal.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer\md__mypyc.cp311-win_amd64.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\psutil\_psutil_windows.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\python3.dllJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\_queue.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\_ssl.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\_queue.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Google\Libs\WR64.sysJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\_socket.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\select.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\_bz2.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\_lzma.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\python311.dllJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer\md.cp311-win_amd64.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\charset_normalizer\md__mypyc.cp311-win_amd64.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI50042\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\charset_normalizer\md.cp311-win_amd64.pydJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI63882\_socket.pydJump to dropped file
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-17188
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeAPI coverage: 0.8 %
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeAPI coverage: 0.8 %
                  Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                  Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                  Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                  Source: C:\Windows\System32\sc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A285A0 FindFirstFileExW,FindClose,0_2_00007FF615A285A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A279B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF615A279B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A40B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF615A40B84
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A285A0 FindFirstFileExW,FindClose,2_2_00007FF615A285A0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A279B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,2_2_00007FF615A279B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A40B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00007FF615A40B84
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4385A0 FindFirstFileExW,FindClose,20_2_00007FF66D4385A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D4379B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,20_2_00007FF66D4379B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D450B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_00007FF66D450B84
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4385A0 FindFirstFileExW,FindClose,21_2_00007FF66D4385A0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D4379B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,21_2_00007FF66D4379B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D450B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_00007FF66D450B84
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9062E70 memset,PyList_New,SetErrorMode,PyArg_ParseTuple,PyObject_IsTrue,PyEval_SaveThread,GetLogicalDriveStringsA,PyEval_RestoreThread,PyErr_SetFromWindowsErr,SetErrorMode,PyEval_SaveThread,GetDriveTypeA,PyEval_RestoreThread,GetVolumeInformationA,strcat_s,SetLastError,strcat_s,strcat_s,strcat_s,FindFirstVolumeMountPointA,strcpy_s,strcat_s,Py_BuildValue,PyList_Append,_Py_Dealloc,FindNextVolumeMountPointA,FindVolumeMountPointClose,strcat_s,strcat_s,Py_BuildValue,PyList_Append,_Py_Dealloc,strchr,SetErrorMode,FindVolumeMountPointClose,SetErrorMode,_Py_Dealloc,_Py_Dealloc,2_2_00007FF8B9062E70
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B90618C0 PyModule_Create2,getenv,RtlGetVersion,GetSystemInfo,InitializeCriticalSection,PyModule_GetState,PyErr_NewException,_Py_Dealloc,PyErr_NewException,PyModule_AddObject,PyErr_NewException,PyModule_AddObject,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,2_2_00007FF8B90618C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2Jump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migrationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\migration\wtrJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\replacementmanifestsJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\migrationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservicesJump to behavior
                  Source: Q3pEXxmWAD.exe, 00000000.00000003.2013077494.0000011C08C2F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000014.00000003.2163575792.0000014F8DC70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: j2aTPs+9xYa9+bG3tD60B8jzljHz7aRP+KNOjSkVWLjVb3/ubCK1sK9IRQq9qEmU
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258371309.000002110BDB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: microsoft-hyper-v-migration-replacement.man
                  Source: conhost.exe, 00000011.00000002.3255036623.000001F6A91C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW{
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258371309.000002110BDC8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: microsoft-hyper-v-client-migration-replacement.man
                  Source: Q3pEXxmWAD.exe, 00000002.00000003.2033859203.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036416769.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2034276392.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2034810962.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2035347309.000002110B031000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258371309.000002110BDC8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: microsoft-hyper-v-drivers-migration-replacement.man
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258371309.000002110BDC8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: fesmicrosoft-hyper-v-drivers-migration-replacement.mantion-plugin
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258371309.000002110BDB4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: fesmicrosoft-hyper-v-migration-replacement.mann0'
                  Source: Q3pEXxmWAD.exe, 00000002.00000002.3258371309.000002110BDC8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: microsoft-hyper-v-client-migration-replacement.mande0
                  Source: Blsvr.exe, 00000005.00000000.2061975106.00007FF758A7B000.00000008.00000001.01000000.00000016.sdmpBinary or memory string: uvMci{
                  Source: conhost.exe, 00000011.00000002.3255036623.000001F6A9169000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A39924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF615A39924
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A42790 GetProcessHeap,0_2_00007FF615A42790
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A2C62C SetUnhandledExceptionFilter,0_2_00007FF615A2C62C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A39924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF615A39924
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A2C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF615A2C44C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A2BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF615A2BBC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A2C62C SetUnhandledExceptionFilter,2_2_00007FF615A2C62C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A39924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF615A39924
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A2C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF615A2C44C
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF615A2BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF615A2BBC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8A92D2135 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8A92D2135
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B7DE3058 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B7DE3058
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B7DE2A90 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B7DE2A90
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B02E70 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B8B02E70
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B03438 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B8B03438
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B225B0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B8B225B0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8B22FF8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B8B22FF8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CC1A00 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B8CC1A00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CC1430 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B8CC1430
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CD1AC0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B8CD1AC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CD14F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B8CD14F0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CE4640 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B8CE4640
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8CE4070 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B8CE4070
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F83690 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B8F83690
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B8F83C60 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B8F83C60
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B906A0C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B906A0C0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B906A9E8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B906A9E8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B908A050 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B908A050
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B908AA98 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B908AA98
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B93C2600 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B93C2600
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B93C2BC0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B93C2BC0
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9841B00 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B9841B00
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9841530 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B9841530
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9F65D20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8B9F65D20
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B9F662C4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8B9F662C4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8BA250AA8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8BA250AA8
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8BFAB52F0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8BFAB52F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D43C62C SetUnhandledExceptionFilter,20_2_00007FF66D43C62C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D449924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00007FF66D449924
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D43C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00007FF66D43C44C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 20_2_00007FF66D43BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_00007FF66D43BBC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D43C62C SetUnhandledExceptionFilter,21_2_00007FF66D43C62C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D449924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF66D449924
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D43C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF66D43C44C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF66D43BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF66D43BBC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7C92135 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8A7C92135
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D63058 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8A7D63058
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8A7D62A90 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8A7D62A90
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B6182E70 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B6182E70
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B6183438 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B6183438
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A25B0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B61A25B0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61A2FF8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B61A2FF8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61D4070 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B61D4070
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B61D4640 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B61D4640
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B6203C60 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B6203C60
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B6203690 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B6203690
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77FA0C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B77FA0C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B77FA9E8 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B77FA9E8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B781AA98 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B781AA98
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B781A050 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B781A050
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B7832BC0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B7832BC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B7832600 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B7832600
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B7FE5D20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B7FE5D20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B7FE62C4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B7FE62C4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8010AA8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B8010AA8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8791A00 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B8791A00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8791430 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B8791430
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8831AC0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B8831AC0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B88314F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B88314F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8C11B00 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B8C11B00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8C11530 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B8C11530
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8CB52F0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF8B8CB52F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B8CB4D20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF8B8CB4D20

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeNtQuerySystemInformation: Direct from: 0x7FF66786613EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeNtQuerySystemInformation: Direct from: 0x7FF758A6613EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeSection loaded: NULL target: C:\Windows\System32\conhost.exe protection: readonlyJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeThread register set: target process: 5664Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeMemory written: C:\Windows\System32\conhost.exe base: 684B254010Jump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess created: C:\Users\user\Desktop\Q3pEXxmWAD.exe "C:\Users\user\Desktop\Q3pEXxmWAD.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\System32\conhost.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exeJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A48880 cpuid 0_2_00007FF615A48880
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\certifi VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\libcrypto-3.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\libffi-8.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\select.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\_socket.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\select.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\_bz2.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\_lzma.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\psutil VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\psutil VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\psutil VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\psutil\_psutil_windows.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\_hashlib.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\unicodedata.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\_queue.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\_ssl.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer\md__mypyc.cp311-win_amd64.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\BJZFPPWAPT VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\EFOYFBOLXA VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\NVWZAPQSQL VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\ZGGKNSUKOP VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\boot VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\boot\en-gb VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\boot\fonts VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\efi VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\efi\microsoft VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\efi\microsoft\boot VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\efi\microsoft\boot\fonts VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\efi\microsoft\boot\resources VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwcompat.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwcompat.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwcompatPE.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwcompatPE.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwcompatPE.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwexclude.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwexclude.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwexclude.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwexcludePE.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwexcludePE.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\hwexcludePE.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\idwbinfo.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\idwbinfo.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\idwbinfo.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\idwbinfo.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-activedirectory-webservices-dl VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-bluetooth-config VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-com-complus-setup-dl VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-com-dtc-setup-dl VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-dhcpservermigplugin-dl VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-directoryservices-adam-dl VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-internet-naming-service-runtime VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-msmq-messagingcoreservice VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-rasserver-migplugin VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-tapisetup VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-terminalservices-licenseserver VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-textservicesframework-migration-dl VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\microsoft-windows-winsock-core-infrastructure-upgrade VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\dlmanifests\networking-mpssvc-svc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\en-gb VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\en-gb\erofflps.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\en-gb\erofflps.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\en-gb\erofflps.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\en-gb\erofflps.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI50042\mnemonic\wordlist\english.txt VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\etwproviders VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\etwproviders\en-gb VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\inf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\migration VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\migration\wtr VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\replacementmanifests\hwvid-migration-2 VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\replacementmanifests\microsoft-activedirectory-webservices VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\replacementmanifests\microsoft-windows-offlinefiles-core\en-gb VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\replacementmanifests\microsoft-windows-pnpmigration VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\sources\uup\metadata VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\support VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: \Device\CdRom0\support\logging VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\Desktop\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\certifi VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic\wordlist VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic\wordlist VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic\wordlist VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic\wordlist VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_ctypes.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\certifi VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\charset_normalizer VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\libcrypto-3.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\libffi-8.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\libssl-3.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\mnemonic VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\python3.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\python311.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\VCRUNTIME140.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_ctypes.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_decimal.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_hashlib.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_lzma.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_queue.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_socket.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\select.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_bz2.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_lzma.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\psutil VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\psutil VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\psutil VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\psutil\_psutil_windows.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI63882\_hashlib.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A2C330 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF615A2C330
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 0_2_00007FF615A44F10 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF615A44F10
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B90618C0 PyModule_Create2,getenv,RtlGetVersion,GetSystemInfo,InitializeCriticalSection,PyModule_GetState,PyErr_NewException,_Py_Dealloc,PyErr_NewException,PyModule_AddObject,PyErr_NewException,PyModule_AddObject,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,PyModule_AddIntConstant,2_2_00007FF8B90618C0

                  Lowering of HIPS / PFW / Operating System Security Settings

                  barindex
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                  Source: conhost.exe, 00000011.00000002.3255036623.000001F6A922E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B93C45E4 PySys_Audit,PyEval_SaveThread,bind,PyEval_RestoreThread,_Py_NoneStruct,2_2_00007FF8B93C45E4
                  Source: C:\Users\user\Desktop\Q3pEXxmWAD.exeCode function: 2_2_00007FF8B93C55F8 _PyArg_ParseTuple_SizeT,PyEval_SaveThread,listen,PyEval_RestoreThread,_Py_NoneStruct,2_2_00007FF8B93C55F8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B78345E4 PySys_Audit,PyEval_SaveThread,bind,PyEval_RestoreThread,_Py_NoneStruct,21_2_00007FF8B78345E4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exeCode function: 21_2_00007FF8B78355F8 _PyArg_ParseTuple_SizeT,PyEval_SaveThread,listen,PyEval_RestoreThread,_Py_NoneStruct,21_2_00007FF8B78355F8
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts31
                  Windows Management Instrumentation
                  11
                  DLL Side-Loading
                  1
                  Abuse Elevation Control Mechanism
                  1
                  Disable or Modify Tools
                  OS Credential Dumping2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  12
                  Windows Service
                  11
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory1
                  System Service Discovery
                  Remote Desktop ProtocolData from Removable Media2
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts3
                  Service Execution
                  12
                  Registry Run Keys / Startup Folder
                  1
                  Access Token Manipulation
                  1
                  Abuse Elevation Control Mechanism
                  Security Account Manager3
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron1
                  Bootkit
                  12
                  Windows Service
                  2
                  Obfuscated Files or Information
                  NTDS46
                  System Information Discovery
                  Distributed Component Object ModelInput Capture1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script311
                  Process Injection
                  11
                  DLL Side-Loading
                  LSA Secrets251
                  Security Software Discovery
                  SSHKeylogging1
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts12
                  Registry Run Keys / Startup Folder
                  1
                  Masquerading
                  Cached Domain Credentials2
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Access Token Manipulation
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt311
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Bootkit
                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1479908 Sample: Q3pEXxmWAD.exe Startdate: 24/07/2024 Architecture: WINDOWS Score: 100 80 pool.supportxmr.com 2->80 82 pool-fr.supportxmr.com 2->82 84 bg.microsoft.map.fastly.net 2->84 88 Multi AV Scanner detection for domain / URL 2->88 90 Malicious sample detected (through community Yara rule) 2->90 92 Multi AV Scanner detection for submitted file 2->92 94 6 other signatures 2->94 10 Q3pEXxmWAD.exe 42 2->10         started        14 Q3pEXxmWAD.exe 42 2->14         started        16 cmd.exe 1 2->16         started        18 4 other processes 2->18 signatures3 process4 file5 60 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 10->60 dropped 62 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 10->62 dropped 64 C:\Users\user\AppData\Local\...\python311.dll, PE32+ 10->64 dropped 72 17 other malicious files 10->72 dropped 106 Contains functionality to infect the boot sector 10->106 108 Drops PE files to the startup folder 10->108 110 Found pyInstaller with non standard icon 10->110 20 Q3pEXxmWAD.exe 1 10->20         started        66 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 14->66 dropped 68 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 14->68 dropped 70 C:\Users\user\AppData\Local\...\python311.dll, PE32+ 14->70 dropped 74 17 other malicious files 14->74 dropped 23 Q3pEXxmWAD.exe 14->23         started        112 Modifies power options to not sleep / hibernate 16->112 25 conhost.exe 16->25         started        27 powercfg.exe 1 16->27         started        35 3 other processes 16->35 29 conhost.exe 18->29         started        31 conhost.exe 18->31         started        33 conhost.exe 18->33         started        37 14 other processes 18->37 signatures6 process7 file8 58 C:\Users\user\AppData\...\Q3pEXxmWAD.exe, PE32+ 20->58 dropped 39 cmd.exe 1 20->39         started        42 cmd.exe 1 23->42         started        process9 signatures10 96 Uses powercfg.exe to modify the power settings 39->96 98 Stops critical windows services 39->98 100 Modifies power options to not sleep / hibernate 39->100 44 Blsvr.exe 4 39->44         started        48 conhost.exe 39->48         started        50 Blsvr.exe 42->50         started        52 conhost.exe 42->52         started        process11 file12 76 C:\Users\user\AppData\Roaming\...\WR64.sys, PE32+ 44->76 dropped 78 C:\Users\user\AppData\...\uyfkrbdwixpr.tmp, PE32+ 44->78 dropped 114 Multi AV Scanner detection for dropped file 44->114 116 Found strings related to Crypto-Mining 44->116 118 Writes to foreign memory regions 44->118 122 4 other signatures 44->122 54 conhost.exe 44->54         started        120 Found direct / indirect Syscall (likely to bypass EDR) 50->120 signatures13 process14 dnsIp15 86 pool-fr.supportxmr.com 141.94.96.195, 3333, 49705 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 54->86 102 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 54->102 signatures16 104 Detected Stratum mining protocol 86->104

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Q3pEXxmWAD.exe37%ReversingLabsWin64.Trojan.Molotov
                  Q3pEXxmWAD.exe44%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe79%ReversingLabsWin64.Trojan.Whisperer
                  C:\Users\user\AppData\Local\Temp\_MEI50042\VCRUNTIME140.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_bz2.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_ctypes.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_decimal.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_hashlib.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_lzma.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_queue.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_socket.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_ssl.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer\md.cp311-win_amd64.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\charset_normalizer\md__mypyc.cp311-win_amd64.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\libcrypto-3.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\libffi-8.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\libssl-3.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\psutil\_psutil_windows.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\python3.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\python311.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\select.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI50042\unicodedata.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe79%ReversingLabsWin64.Trojan.Whisperer
                  C:\Users\user\AppData\Local\Temp\_MEI63882\VCRUNTIME140.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\_bz2.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\_ctypes.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\_decimal.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\_hashlib.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\_lzma.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\_queue.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\_socket.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\_ssl.pyd0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\_MEI63882\charset_normalizer\md.cp311-win_amd64.pyd0%ReversingLabs
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  pool-fr.supportxmr.com3%VirustotalBrowse
                  bg.microsoft.map.fastly.net0%VirustotalBrowse
                  pool.supportxmr.com9%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://core.telegram.org/bots/api#sendvenue0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#sendvideo0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#botname0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#chatmemberowner0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#getchatadministrators0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#chatpermissions0%Avira URL Cloudsafe
                  https://github.com/giampaolo/psutil/issues/875.0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#getchatadministrators0%VirustotalBrowse
                  https://core.telegram.org/bots/api#sendvideo0%VirustotalBrowse
                  https://core.telegram.org/bots/api#botname0%VirustotalBrowse
                  https://core.telegram.org/bots/api#inputmediaaudio0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#unhidegeneralforumtopic0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#chatpermissions0%VirustotalBrowse
                  https://core.telegram.org/bots/api#sendvenue0%VirustotalBrowse
                  https://github.com/giampaolo/psutil/issues/875.0%VirustotalBrowse
                  https://core.telegram.org/bots/api#setstickersetthumb0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#getstickerset0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inputmediaaudio0%VirustotalBrowse
                  https://core.telegram.org/bots/api#unhidegeneralforumtopic0%VirustotalBrowse
                  https://core.telegram.org/bots/api#chatmemberowner0%VirustotalBrowse
                  https://core.telegram.org/bots/api#forumtopiccreated0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inlinequeryresult0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#replykeyboardmarkup0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#chatfullinfo0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inlinequeryresult0%VirustotalBrowse
                  https://core.telegram.org/bots/api#sendmediagroup0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#backgroundfill0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#replykeyboardmarkup0%VirustotalBrowse
                  https://core.telegram.org/bots/api#forumtopiccreated0%VirustotalBrowse
                  https://core.telegram.org/bots/api#setstickersetthumb0%VirustotalBrowse
                  https://core.telegram.org/bots/api#chatfullinfo0%VirustotalBrowse
                  https://core.telegram.org/bots/api#getchatmembercount0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#getstickerset0%VirustotalBrowse
                  https://core.telegram.org/bots/api#messagereactioncountupdated0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#revokechatinvitelink0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#backgroundfill0%VirustotalBrowse
                  https://core.telegram.org/bots/api#sendphoto0%Avira URL Cloudsafe
                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#sendmediagroup0%VirustotalBrowse
                  https://core.telegram.org/bots/api#forcereply0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#messagereactioncountupdated0%VirustotalBrowse
                  https://core.telegram.org/bots/api#revokechatinvitelink0%VirustotalBrowse
                  https://core.telegram.org/bots/api#getchatmembercount0%VirustotalBrowse
                  https://core.telegram.org/bots/api#inlinequeryresultcachedsticker0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#sendphoto0%VirustotalBrowse
                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%VirustotalBrowse
                  https://core.telegram.org/bots/api#getchatmember0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#forcereply0%VirustotalBrowse
                  http://goo.gl/zeJZl.0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#forumtopic0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inlinequeryresultcachedsticker0%VirustotalBrowse
                  https://core.telegram.org/bots/api#inlinequeryresultcacheddocument0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#replyparameters0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#chatadministratorrights0%Avira URL Cloudsafe
                  http://goo.gl/zeJZl.0%VirustotalBrowse
                  https://core.telegram.org/bots/api#getchatmember0%VirustotalBrowse
                  https://core.telegram.org/bots/api#proximityalerttriggered0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inlinequeryresultcacheddocument0%VirustotalBrowse
                  https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#chatadministratorrights0%VirustotalBrowse
                  https://core.telegram.org/bots/api#businesslocation0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#forumtopic0%VirustotalBrowse
                  https://core.telegram.org/bots/api#messageautodeletetimerchanged0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#proximityalerttriggered0%VirustotalBrowse
                  https://core.telegram.org/bots/api#replyparameters0%VirustotalBrowse
                  https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%VirustotalBrowse
                  https://core.telegram.org/bots/api#businesslocation0%VirustotalBrowse
                  https://core.telegram.org/bots/api#birthdate0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#messageautodeletetimerchanged0%VirustotalBrowse
                  https://core.telegram.org/bots/api#shippingaddress0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#closeforumtopic0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#shippingaddress0%VirustotalBrowse
                  https://core.telegram.org/bots/api#externalreplyinfo0%Avira URL Cloudsafe
                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#birthdate0%VirustotalBrowse
                  https://core.telegram.org/bots/api#editmessagecaption0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#chatlocation0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#stopmessagelivelocation0%Avira URL Cloudsafe
                  http://curl.haxx.se/rfc/cookie_spec.html0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#closeforumtopic0%VirustotalBrowse
                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inlinequeryresultcontact0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inlinequeryresultcachedvideo0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#setmyname0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inlinequeryresultaudio0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#successfulpayment0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#backgroundtypechattheme0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#setchatmenubutton0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#document0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#copymessages0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#inlinequeryresultvenue0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#hidegeneralforumtopic0%Avira URL Cloudsafe
                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
                  https://github.com/python/cpython/issues/86361.0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#keyboardbuttonpolltype0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#backgroundtypefill0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#setmessagereaction0%Avira URL Cloudsafe
                  http://mail.python.org/pipermail/python-dev/2012-June/120787.html.0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#chatmemberupdated0%Avira URL Cloudsafe
                  https://core.telegram.org/bots/api#setchatphoto0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  pool-fr.supportxmr.com
                  141.94.96.195
                  truetrueunknown
                  bg.microsoft.map.fastly.net
                  199.232.210.172
                  truefalseunknown
                  pool.supportxmr.com
                  unknown
                  unknowntrueunknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://core.telegram.org/bots/api#botnameQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#chatmemberownerQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#sendvenueQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#getchatadministratorsQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#sendvideoQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#chatpermissionsQ3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/giampaolo/psutil/issues/875.Q3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2033859203.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036239728.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2033818312.000002110B06A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2035118346.000002110AFAB000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inputmediaaudioQ3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#unhidegeneralforumtopicQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#setstickersetthumbQ3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#getstickersetQ3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#forumtopiccreatedQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#replykeyboardmarkupQ3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#chatfullinfoQ3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#sendmediagroupQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#backgroundfillQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#getchatmembercountQ3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#messagereactioncountupdatedQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AF70000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043771893.000002110AF70000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#revokechatinvitelinkQ3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#sendphotoQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#Q3pEXxmWAD.exe, 00000002.00000002.3253737288.0000021109078000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031692203.0000021109090000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031195401.00000211090A9000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#forcereplyQ3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultcachedstickerQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#getchatmemberQ3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFF1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFF0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110AFF1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://goo.gl/zeJZl.Q3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#forumtopicQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultcacheddocumentQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#replyparametersQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B69C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#chatadministratorrightsQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#proximityalerttriggeredQ3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2035168608.000002110B07A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2034810962.000002110B073000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#businesslocationQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#messageautodeletetimerchangedQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#birthdateQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#shippingaddressQ3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#closeforumtopicQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#externalreplyinfoQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#editmessagecaptionQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#stopmessagelivelocationQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#chatlocationQ3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://curl.haxx.se/rfc/cookie_spec.htmlQ3pEXxmWAD.exe, 00000002.00000002.3258134310.000002110BBD0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B6A6000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046398537.000002110B7EB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047467606.000002110B6BB000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxyQ3pEXxmWAD.exe, 00000002.00000002.3257991414.000002110BAD0000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultcontactQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultcachedvideoQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#setmynameQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultaudioQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#successfulpaymentQ3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B69C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#backgroundtypechatthemeQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#setchatmenubuttonQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#documentQ3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B510000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B50D000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#copymessagesQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultvenueQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#hidegeneralforumtopicQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerQ3pEXxmWAD.exe, 00000002.00000002.3253737288.0000021109078000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031692203.0000021109090000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2031195401.00000211090A9000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/python/cpython/issues/86361.Q3pEXxmWAD.exe, 00000002.00000003.2035347309.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036287140.000002110B07A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036375396.000002110B0FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2035246765.000002110B0FA000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#keyboardbuttonpolltypeQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#backgroundtypefillQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040460336.000002110B5C8000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B5B9000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B5BF000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#setmessagereactionQ3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110AFF2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFF1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFEB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFF0000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110AFF1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://mail.python.org/pipermail/python-dev/2012-June/120787.html.Q3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3254796752.000002110AB10000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#chatmemberupdatedQ3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042802217.000002110B66E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040054615.000002110B124000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#setchatphotoQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://httpbin.org/Q3pEXxmWAD.exe, 00000002.00000003.2048600214.000002110B7C1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#createinvoicelinkQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultcachedphotoQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#restrictchatmemberQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.cl.cam.ac.uk/~mgk25/iso-time.htmlQ3pEXxmWAD.exe, 00000002.00000003.2032571621.000002110B005000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110AFBE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032872948.000002110B020000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110B01C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032628407.000002110AFB7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultcachedgifQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#sendanimationQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#getmyshortdescriptionQ3pEXxmWAD.exe, 00000002.00000002.3255643308.000002110B140000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#banchatmemberQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#userprofilephotosQ3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255779775.000002110B280000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#createchatinvitelinkQ3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255008842.000002110AD10000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inputmediaanimationQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054691134.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B6FA000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#animationQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#maskpositionQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#menubuttoncommandsQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255930055.000002110B3B0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#linkpreviewoptionsQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#setstickerpositioninsetQ3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110AFAB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110AF98000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038179352.000002110AFDC000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AFA2000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110AF93000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110AFDC000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tools.ietf.org/html/rfc6125#section-6.4.3Q3pEXxmWAD.exe, 00000002.00000002.3257991414.000002110BAD0000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#backgroundtypewallpaperQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#getforumtopiciconstickersQ3pEXxmWAD.exe, 00000002.00000002.3255214542.000002110AE40000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inputlocationmessagecontentQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#sendinvoiceQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.teleQ3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#botdescriptionQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://google.com/mailQ3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110AF40000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.telegram.org/file/botQ3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.phys.uu.nl/~vgent/calendar/isocalendar.htmQ3pEXxmWAD.exe, 00000002.00000003.2032571621.000002110B005000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110AFBE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032872948.000002110B020000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032762840.000002110B01C000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2032628407.000002110AFB7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#backgroundfillsolidQ3pEXxmWAD.exe, 00000002.00000003.2039903383.000002110B8CE000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3257675506.000002110B8C0000.00000004.00001000.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#copymessageQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultmpeg4gifQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinekeyboardmarkupQ3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B65E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043861852.000002110B50E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#unpinallchatmessagesQ3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2038825071.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036990859.000002110B0B4000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tools.ietf.Q3pEXxmWAD.exe, 00000002.00000003.2046437795.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2044723333.000002110B778000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B758000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B758000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#chatinvitelinkQ3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040081091.000002110B514000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2045494816.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2054533904.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041008281.000002110B58A000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043082947.000002110B636000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B636000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#deletechatstickersetQ3pEXxmWAD.exe, 00000002.00000003.2037522955.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039291619.000002110B073000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2036870636.000002110B4C1000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255362338.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://core.telegram.org/bots/api#inlinequeryresultvideoQ3pEXxmWAD.exe, 00000002.00000003.2053122954.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2046801194.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3256115360.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2042184831.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2056356906.000002110B11F000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043569177.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2047533967.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2043412066.000002110B60E000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2039967491.000002110B5AB000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000002.3255597757.000002110B120000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2040326494.000002110B606000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2055776137.000002110B031000.00000004.00000020.00020000.00000000.sdmp, Q3pEXxmWAD.exe, 00000002.00000003.2041925607.000002110B031000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  141.94.96.195
                  pool-fr.supportxmr.comGermany
                  680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesetrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1479908
                  Start date and time:2024-07-24 10:57:11 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 10m 40s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:41
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Q3pEXxmWAD.exe
                  renamed because original name is a hash value
                  Original Sample Name:f468ae483026819d6977e2a5e34ea52a.exe
                  Detection:MAL
                  Classification:mal100.adwa.spyw.evad.mine.winEXE@67/73@1/1
                  EGA Information:
                  • Successful, ratio: 80%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 52.165.165.26, 20.3.187.198, 20.166.126.56
                  • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target Blsvr.exe, PID 1352 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report creation exceeded maximum time and may have missing disassembly code information.
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  TimeTypeDescription
                  04:58:04API Interceptor2x Sleep call for process: Blsvr.exe modified
                  10:58:05AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  141.94.96.195http://pool.supportxmr.comGet hashmaliciousUnknownBrowse
                  • pool.supportxmr.com/favicon.ico
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  pool-fr.supportxmr.comfile.exeGet hashmaliciousAmadey, Babadeda, Stealc, Vidar, XmrigBrowse
                  • 141.94.96.71
                  kWYLtJ0Cn1.exeGet hashmaliciousLoaderBot, XmrigBrowse
                  • 141.94.96.195
                  updater.exeGet hashmaliciousXmrigBrowse
                  • 141.94.96.71
                  xjSglbp263.exeGet hashmaliciousXmrigBrowse
                  • 141.94.96.71
                  gwRQinPOHB.exeGet hashmaliciousXmrigBrowse
                  • 141.94.96.195
                  FieroHack.exeGet hashmaliciousXmrigBrowse
                  • 141.94.96.195
                  FieroHack.exeGet hashmaliciousLummaC, XmrigBrowse
                  • 141.94.96.195
                  gVRqUej0ci.exeGet hashmaliciousXmrigBrowse
                  • 141.94.96.71
                  h2UFp4aCRq.exeGet hashmaliciousLoaderBot, XmrigBrowse
                  • 141.94.96.144
                  setup.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                  • 141.94.96.71
                  bg.microsoft.map.fastly.netBuilding Made Easy Proposal .pdfGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  http://www.equilibriumwaste.co.zaGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  VeNObWIHOOHWfIx.exeGet hashmaliciousFormBookBrowse
                  • 199.232.214.172
                  1721804764a66192ba8849c107aecf73332780289e57101d88022de3de452c4d4afc349344344.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  • 199.232.210.172
                  INV-23072024.vbsGet hashmaliciousAsyncRAT, DcRatBrowse
                  • 199.232.214.172
                  WLF-PO240724.exeGet hashmaliciousFormBookBrowse
                  • 199.232.214.172
                  Cheque.jsGet hashmaliciousAgentTeslaBrowse
                  • 199.232.210.172
                  SecuriteInfo.com.W64.Remsim.A.gen.Eldorado.25959.6491.exeGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  https://www.girisim.io/Get hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  https://app-min-bankid-no.codeanyapp.com/well-known/AHDY/populaire/securpass.htmlGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  DFNVereinzurFoerderungeinesDeutschenForschungsnetzese83M0VAEEuh.exeGet hashmaliciousWhiteSnake StealerBrowse
                  • 131.188.40.189
                  wAO7F8FbEz.elfGet hashmaliciousUnknownBrowse
                  • 141.32.67.218
                  yIRn1ZmsQF.elfGet hashmaliciousUnknownBrowse
                  • 130.183.202.80
                  0GJSC4Ua2K.elfGet hashmaliciousUnknownBrowse
                  • 141.41.31.138
                  kWYLtJ0Cn1.exeGet hashmaliciousLoaderBot, XmrigBrowse
                  • 141.94.96.144
                  Fzfee1Lgc2.elfGet hashmaliciousUnknownBrowse
                  • 137.248.101.131
                  gUJak0onLk.elfGet hashmaliciousUnknownBrowse
                  • 139.6.220.162
                  updater.exeGet hashmaliciousXmrigBrowse
                  • 141.94.96.195
                  http://nys-ns.com/Get hashmaliciousUnknownBrowse
                  • 141.95.124.137
                  http://nys-ns.com/Get hashmaliciousUnknownBrowse
                  • 141.95.124.137
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\_MEI50042\_bz2.pydSecuriteInfo.com.Win64.Malware-gen.26781.23689.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.FileRepMalware.12911.13114.exeGet hashmaliciousUnknownBrowse
                      ip_new.exeGet hashmaliciousUnknownBrowse
                        tool.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.FileRepMalware.30979.22180.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Trojan.GenericKD.71496926.20240.16491.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.HEUR.Trojan-PSW.Python.Agent.gen.20299.21858.exeGet hashmaliciousDiscord Token StealerBrowse
                                SecuriteInfo.com.Trojan.PWS.Stealer.35370.10650.6262.exeGet hashmaliciousLuna LoggerBrowse
                                  QuackMod.exeGet hashmaliciousUnknownBrowse
                                    C:\Users\user\AppData\Local\Temp\_MEI50042\VCRUNTIME140.dllPqeSvE23O1.exeGet hashmaliciousUnknownBrowse
                                      botShell9.exeGet hashmaliciousUnknownBrowse
                                        pharaoh.exeGet hashmaliciousUnknownBrowse
                                          PDFv_82526614.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Win64.Evo-gen.29709.21053.exeGet hashmaliciousUnknownBrowse
                                              Built.exeGet hashmaliciousBlank GrabberBrowse
                                                Hy8tOvpeSV.exeGet hashmaliciousUnknownBrowse
                                                  Antilose 2.0.exeGet hashmaliciousXWormBrowse
                                                    https://github.com/AccentuSoft/LinkScope_Client/releases/download/v1.6.2/LinkScope_Installer.exeGet hashmaliciousUnknownBrowse
                                                      SecuriteInfo.com.Win32.Evo-gen.6791.6790.exeGet hashmaliciousPython Stealer, CStealer, XmrigBrowse
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5701632
                                                        Entropy (8bit):7.7339181361147675
                                                        Encrypted:false
                                                        SSDEEP:98304:MC1R5Ydjykb9bMC9HLoR0OV/rLu4zFEuifdcpUaRMHt:M8kb9AClufpwfdcWaRMH
                                                        MD5:4781C53D9BB1CB237B653C687028203D
                                                        SHA1:16A27B614D5EB2500C1CBE0AA25048D27363598F
                                                        SHA-256:2B6AE672822198B68503B3D37D12025C9D4FC1B7E24ED833F349ECC6FBBFC655
                                                        SHA-512:6D7B70CBD775598674D85F01B69F3BE038B4BF95C8F222C2B7C38E1EC7D379CD747B37DBF50DF0440DBB771A85D67C2324B80682CF569F0AA41703D03054AD94
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 79%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Jd...............&......V................@..............................W.......W...`... ...............................................W.4....@W..-....V.|............pW.0........................... .V.(.....................W.P............................text...............................`..`.data.....T.......T.................@....rdata...7....V..8...dV.............@..@.pdata..|.....V.......V.............@..@.xdata........V.......V.............@..@.bss..........V..........................idata..4.....W.......V.............@....CRT....`.... W.......V.............@....tls.........0W.......V.............@....rsrc....-...@W.......V.............@....reloc..0....pW.......V.............@..B........................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):119192
                                                        Entropy (8bit):6.6016214745004635
                                                        Encrypted:false
                                                        SSDEEP:1536:+qvQ1Dj2DkX7OcujarvmdlYNABCmgrP4ddbkZIecbWcFML/UXzlghzdMFw84hzk:+qvQ1D2CreiABCmgYecbWVLUD6h+b4ho
                                                        MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
                                                        SHA1:A19F08BB2B1C1DE5BB61DAF9F2304531321E0E40
                                                        SHA-256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
                                                        SHA-512:0DA644472B374F1DA449A06623983D0477405B5229E386ACCADB154B43B8B083EE89F07C3F04D2C0C7501EAD99AD95AECAA5873FF34C5EEB833285B598D5A655
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: PqeSvE23O1.exe, Detection: malicious, Browse
                                                        • Filename: botShell9.exe, Detection: malicious, Browse
                                                        • Filename: pharaoh.exe, Detection: malicious, Browse
                                                        • Filename: PDFv_82526614.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Win64.Evo-gen.29709.21053.exe, Detection: malicious, Browse
                                                        • Filename: Built.exe, Detection: malicious, Browse
                                                        • Filename: Hy8tOvpeSV.exe, Detection: malicious, Browse
                                                        • Filename: Antilose 2.0.exe, Detection: malicious, Browse
                                                        • Filename: , Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Win32.Evo-gen.6791.6790.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.../c../c../c._]b./c..W.../c../b./c../c../c...`./c...g./c...f./c...c./c....../c...a./c.Rich./c.........................PE..d.....cW.........." ...&. ...d......................................................-.....`A.........................................e..4...4m...........................O...........N..p............................L..@............0...............................text...&........................... ..`fothk........ ...................... ..`.rdata..\C...0...D...$..............@..@.data...p............h..............@....pdata...............l..............@..@_RDATA...............x..............@..@.rsrc................z..............@..@.reloc...............~..............@..B................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):84760
                                                        Entropy (8bit):6.5692755156011025
                                                        Encrypted:false
                                                        SSDEEP:1536:cfz7OThu5JLlHRGxlDAwGzzVXU8dhkb48UlIyCVJ7SyMxD:cfzSFlDlCHdhkmlIyCVJU
                                                        MD5:AFAA11704FDA2ED686389080B6FFCB11
                                                        SHA1:9A9C83546C2E3B3CCF823E944D5FD07D22318A1B
                                                        SHA-256:AB34B804DA5B8E814B2178754D095A4E8AEAD77EEFD3668DA188769392CDB5F4
                                                        SHA-512:DE23BB50F1D416CF4716A5D25FE12F4B66E6226BB39E964D0DE0FEF1724D35B48C681809589C731D3061A97C62B4DC7B9B7DFE2978F196F2D82CCCE286BE8A2A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: SecuriteInfo.com.Win64.Malware-gen.26781.23689.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.FileRepMalware.12911.13114.exe, Detection: malicious, Browse
                                                        • Filename: ip_new.exe, Detection: malicious, Browse
                                                        • Filename: tool.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.FileRepMalware.30979.22180.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Trojan.GenericKD.71496926.20240.16491.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.HEUR.Trojan-PSW.Python.Agent.gen.20299.21858.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Trojan.PWS.Stealer.35370.10650.6262.exe, Detection: malicious, Browse
                                                        • Filename: QuackMod.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<..R..R..R......R...S..R.....R...W..R...V..R...Q..R...S..R..S..R..S..R..._..R...R..R......R...P..R.Rich.R.........................PE..d....(ne.........." ...%.....^...............................................P.......i....`.........................................p...H............0....... .. ......../...@..........T...........................p...@............................................text...7........................... ..`.rdata..L>.......@..................@..@.data...............................@....pdata.. .... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):124696
                                                        Entropy (8bit):6.043702317006711
                                                        Encrypted:false
                                                        SSDEEP:3072:DJMe7jc823LQHUlYsNZfLIbKV6pJfJIyLPKZ:DWeoL0GNZfLIbCcJfi
                                                        MD5:78DF76AA0FF8C17EDC60376724D206CD
                                                        SHA1:9818BD514D3D0FC1749B2D5EF9E4D72D781B51DD
                                                        SHA-256:B75560DB79BA6FB56C393A4886EEDD72E60DF1E2F7F870FE2E356D08155F367B
                                                        SHA-512:6189C1BD56DB5B7A9806960BC27742D97D2794ACEBC32E0A5F634FE0FF863E1775DCF90224504D5E2920A1192A3C1511FB84D41D7A2B69C67D3BDFBAB2F968FA
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........X...X...X...Q.*.^...M...Z...M...T...M...P...M...\...b...Z.......Y.......^.......[...X.......b...^...b...Y...b.F.Y...b...Y...RichX...........PE..d....'ne.........." ...%.............\..............................................\.....`..........................................Q.......Q..................P......../..............T...........................`...@............................................text............................... ..`.rdata..2m.......n..................@..@.data...$=...p...8...`..............@....pdata..P...........................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):253720
                                                        Entropy (8bit):6.556660448912721
                                                        Encrypted:false
                                                        SSDEEP:6144:JFrhZMm47r6aA2MQbPS4ELT4zH2n9qWM53pLW1A+tARs4:JFrhV4qaA2ffEozWa0ARD
                                                        MD5:33F721F1CBB413CD4F26FE0ED4A597E7
                                                        SHA1:476D5FAB7B2DB3F53B90B7CC6099D5541E72883E
                                                        SHA-256:080D0FBBFF68D17B670110C95210347BE7B8AB7C385F956F123A66DC2F434AB3
                                                        SHA-512:8FBC82AF0FE063C4EB8FDEFAE5650924AC607BE54B81C4D51064CA720BB85BFC9E1705BA93DF5BE6ADD156A6B360DD1F700618862877E28DE7C13E21B470B507
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........mBP\.,.\.,.\.,.Ut..R.,.Is-.^.,.Is).Q.,.Is(.T.,.Is/.X.,.f.-._.,..t-.^.,.\.-...,.f./.].,.f.!.S.,.f.,.].,.f...].,.f...].,.Rich\.,.........PE..d....'ne.........." ...%.x...<............................................................`..........................................T..P....T..................`'......./......P.......T...........................p...@............................................text...5w.......x.................. ..`.rdata...............|..............@..@.data....*...p...$...T..............@....pdata..`'.......(...x..............@..@.rsrc...............................@..@.reloc..P...........................@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):65304
                                                        Entropy (8bit):6.25487370026842
                                                        Encrypted:false
                                                        SSDEEP:1536:nuY1lTorKn+zF9G0pLOjWNBgdIyOI8f7SyxxUx:nuY+9GIOjiBgdIyOI8fY
                                                        MD5:534902BE1D8A57974EFD025AFF4F11EF
                                                        SHA1:1179C6153DC52F72C29FE1591DC9A889C2E229E9
                                                        SHA-256:30ADFB86513282E59D7E27968E1FF6686E43B8559994A50C17BE66D0789F82B3
                                                        SHA-512:7F0CDCF8576FAF30FC8104B9BC9586D85AD50B7803074A7BCAA192EED05B1E2BD988A91873554FB63F204FCAD86C667E95755C5FF13C43F96DC334EF3EA37240
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>@j.P.j.P.j.P.c...n.P...Q.h.P...U.f.P...T.b.P...S.i.P.PaQ.h.P.!.Q.h.P...Q.i.P.j.Q...P.Pa].k.P.PaP.k.P.Pa..k.P.PaR.k.P.Richj.P.........PE..d... (ne.........." ...%.T...~......0@..............................................a_....`.............................................P................................/......X...P}..T............................|..@............p..0............................text....S.......T.................. ..`.rdata..rO...p...P...X..............@..@.data...8...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):159000
                                                        Entropy (8bit):6.852849132106876
                                                        Encrypted:false
                                                        SSDEEP:3072:Bl2grSWcJSEoLSHK/znfU9mNo2s2AaK5VlIyZ1Zxzp:Blh2nJ9a8YO2u7rp
                                                        MD5:2AE2464BFCC442083424BC05ED9BE7D2
                                                        SHA1:F64B100B59713E51D90D2E016B1FE573B6507B5D
                                                        SHA-256:64BA475A28781DCA81180A1B8722A81893704F8D8FAC0B022C846FDCF95B15B9
                                                        SHA-512:6C3ACD3DCAE733452AD68477417693AF64A7D79558E8EC9F0581289903C2412E2F29195B90E396BFDCD765337A6DEA9632E4B8D936AC39B1351CD593CB12CE27
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......RH...)t..)t..)t..Q...)t..Vu..)t..Vq..)t..Vp..)t..Vw..)t.,.u..)t.]Qu..)t..)u.p)t.,.y.,)t.,.t..)t.,....)t.,.v..)t.Rich.)t.................PE..d...#(ne.........." ...%.b..........P6....................................................`..........................................%..L...L%..x....p.......P.......>.../......8.......T...........................p...@............................................text....a.......b.................. ..`.rdata..............f..............@..@.data........@......................@....pdata.......P......................@..@.rsrc........p.......2..............@..@.reloc..8............<..............@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):32536
                                                        Entropy (8bit):6.445663619180805
                                                        Encrypted:false
                                                        SSDEEP:768:y+yFV6rXzmxU9JIyQUM5YiSyvKtp/AMxkEj:y+wEXzWU9JIyQU27Sy4xH
                                                        MD5:DBD3C2C0A348A44A96D76100690C606D
                                                        SHA1:04E901EAC1161255ADB16155459AC50F124B30A6
                                                        SHA-256:2BFD8459BA01C741D676F79EE96802FB2C29CB30F50301D67FDE8BBCE8E7E7D4
                                                        SHA-512:99FEE97C272BFFF4515407D588B2761AF7BE39A83BE070E01128FBA71FF75404FBAD6352BCDBE5465786CE86A6550F47B177D022CCB53F32F5A482DB61BEE3B4
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z2.X.Sa..Sa..Sa..+...Sa..,`..Sa..,d..Sa..,e..Sa..,b..Sa.$.`..Sa.U+`..Sa..S`.TSa.$.l..Sa.$.a..Sa.$...Sa.$.c..Sa.Rich.Sa.................PE..d....'ne.........." ...%.....8...........................................................`..........................................C..L....C..d....p.......`.......P.../..........p4..T...........................03..@............0..0............................text............................... ..`.rdata..R....0......................@..@.data...x....P.......<..............@....pdata.......`.......@..............@..@.rsrc........p.......D..............@..@.reloc...............N..............@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):79640
                                                        Entropy (8bit):6.288109761411876
                                                        Encrypted:false
                                                        SSDEEP:1536:sRbflgPFXDclujZ9/s+S+pzpGkTFVf7KJIyLw57SyCxz7:sDm1EujZ9/sT+pz0KFVTKJIyLw567
                                                        MD5:11B7936A5BD929CC76AC3F4F137B5236
                                                        SHA1:09CB712FA43DC008EB5185481A5080997AFF82AB
                                                        SHA-256:8956B11C07D08D289425E7240B8FA37841A27C435617DBBD02BFE3F9405F422B
                                                        SHA-512:7B050DF283A0AD4295A5BE47B99D7361F49A3CFD20691E201C5DA5349A9EB8F5710AB3A26A66D194567539660ED227411485F4EDF2269567A55A6B8CCFD71096
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........h...............q.......v.......v.......v.......v.......................q........................l.............Rich....................PE..d....(ne.........." ...%.l...........%.......................................P............`.............................................P............0....... ..x......../...@..........T...............................@............................................text....k.......l.................. ..`.rdata...t.......v...p..............@..@.data...............................@....pdata..x.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):176920
                                                        Entropy (8bit):5.956358505915276
                                                        Encrypted:false
                                                        SSDEEP:3072:hjIQQj5DC1z/39/2uXU6XjXylB9d43Olh59YL48PMrN/WgAlNiVlIyC7WN:Kj5mRPxbU6XjK4TLiVL
                                                        MD5:0E9E6D6839D74AD40BB9F16CC6601B13
                                                        SHA1:6671039088793F4BA42F5BD4409C26B1283CEAFA
                                                        SHA-256:BCA1F490C9F7BA25CBBB4B39785DDA8AA651123E22D4E7EDC299B218C8157A81
                                                        SHA-512:CB8742AE5DB83487C21BA17D9EFACA736DF49F8F3C4A72355EDE119717B83E0B4C6D94BD1C75A992ABAF4AB89502A805F81B2529E85FD6A656600D6E7B0C90F5
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............L...L...L..VL...L...M...L...M...L...M...L...M...L.f.M...Lc..M...L...L4..L..M...L.f.M...L.f.M...L.f:L...L.f.M...LRich...L........PE..d...#(ne.........." ...%............l+..............................................Y.....`.........................................0...d................................/......|...P...T...............................@............................................text.............................. ..`.rdata...".......$..................@..@.data...............................@....pdata...............\..............@..@.rsrc................h..............@..@.reloc..|............r..............@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                        Category:dropped
                                                        Size (bytes):1442277
                                                        Entropy (8bit):5.590680301756823
                                                        Encrypted:false
                                                        SSDEEP:24576:mQR5pATG8/R5lUKdcubgAnyfb6/X0iwhmdmzNPFa0HHp:mQR5pE/RJvG
                                                        MD5:81CD6D012885629791A9E3D9320C444E
                                                        SHA1:53268184FDBDDF8909C349ED3C6701ABE8884C31
                                                        SHA-256:A18892E4F2F2EC0DEE5714429F73A5ADD4E355D10A7BA51593AFC730F77C51DD
                                                        SHA-512:D5BF47FAD8B1F5C7DCAA6BEF5D4553E461F46E6C334B33D8ADC93689CF89365C318F03E961A5D33994730B72DC8BDE62209BACA015D0D2D08A081D82DF7DFD73
                                                        Malicious:false
                                                        Preview:PK..........!.h%..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):292541
                                                        Entropy (8bit):6.048162209044241
                                                        Encrypted:false
                                                        SSDEEP:6144:QW1x/M8fRR1jplkXURrVADwYCuCigT/Q5MSRqNb7d8iu5NF:QWb/TRJLWURrI55MWavdF0D
                                                        MD5:D3E74C9D33719C8AB162BAA4AE743B27
                                                        SHA1:EE32F2CCD4BC56CA68441A02BF33E32DC6205C2B
                                                        SHA-256:7A347CA8FEF6E29F82B6E4785355A6635C17FA755E0940F65F15AA8FC7BD7F92
                                                        SHA-512:E0FB35D6901A6DEBBF48A0655E2AA1040700EB5166E732AE2617E89EF5E6869E8DDD5C7875FA83F31D447D4ABC3DB14BFFD29600C9AF725D9B03F03363469B4C
                                                        Malicious:false
                                                        Preview:.# Issuer: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Subject: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Label: "GlobalSign Root CA".# Serial: 4835703278459707669005204.# MD5 Fingerprint: 3e:45:52:15:09:51:92:e1:b7:5d:37:9f:b1:87:29:8a.# SHA1 Fingerprint: b1:bc:96:8b:d4:f4:9d:62:2a:a8:9a:81:f2:15:01:52:a4:1d:82:9c.# SHA256 Fingerprint: eb:d4:10:40:e4:bb:3e:c7:42:c9:e3:81:d3:1e:f2:a4:1a:48:b6:68:5c:96:e7:ce:f3:c1:df:6c:d4:33:1c:99.-----BEGIN CERTIFICATE-----.MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG.A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv.b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw.MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i.YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT.aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ.jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp.xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):10752
                                                        Entropy (8bit):4.673454313041419
                                                        Encrypted:false
                                                        SSDEEP:96:KG+p72HzA5iJGhU2Y0hQMsQJCUCLsZEA4elh3XQMtCFliHUWQcX6g8cim1qeSju1:A2HzzU2bRYoeLHkcqgvimoe
                                                        MD5:723EC2E1404AE1047C3EF860B9840C29
                                                        SHA1:8FC869B92863FB6D2758019DD01EDBEF2A9A100A
                                                        SHA-256:790A11AA270523C2EFA6021CE4F994C3C5A67E8EAAAF02074D5308420B68BD94
                                                        SHA-512:2E323AE5B816ADDE7AAA14398F1FDB3EFE15A19DF3735A604A7DB6CADC22B753046EAB242E0F1FBCD3310A8FBB59FF49865827D242BAF21F44FD994C3AC9A878
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..............................M....................................... ...?.......?.......?.a.....?.......Rich............................PE..d...siAe.........." ...%.....................................................p............`..........................................'..p...`(..d....P.......@...............`..,...`#.............................. "..@............ ...............................text............................... ..`.rdata....... ......................@..@.data...8....0......."..............@....pdata.......@.......$..............@..@.rsrc........P.......&..............@..@.reloc..,....`.......(..............@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):119296
                                                        Entropy (8bit):5.872097486056729
                                                        Encrypted:false
                                                        SSDEEP:1536:OzgMw0g+m/+rxC9Jtd960WsCyqPD1/bZMlDML48Be9zGTVmZRJIRbvB:OsTH+VC9Jtd9VdCr7fMp/8yGTVmzmZ
                                                        MD5:9EA8098D31ADB0F9D928759BDCA39819
                                                        SHA1:E309C85C1C8E6CE049EEA1F39BEE654B9F98D7C5
                                                        SHA-256:3D9893AA79EFD13D81FCD614E9EF5FB6AAD90569BEEDED5112DE5ED5AC3CF753
                                                        SHA-512:86AF770F61C94DFBF074BCC4B11932BBA2511CAA83C223780112BDA4FFB7986270DC2649D4D3EA78614DBCE6F7468C8983A34966FC3F2DE53055AC6B5059A707
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........C..r...r...r......r...s...r...s...r...w...r...v..r...q...r.#.s...r...s...r..8z...r..8r...r..8....r..8p...r.Rich..r.........................PE..d...siAe.........." ...%.*..........0........................................ ............`.........................................p...d..........................................Px...............................w..@............@...............................text...X).......*.................. ..`.rdata...X...@...Z..................@..@.data...8=.......0..................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5162776
                                                        Entropy (8bit):5.958207976652471
                                                        Encrypted:false
                                                        SSDEEP:98304:S3+FRtLtlVriXpshX179Cahd4tC9P1+1CPwDvt3uFlDCi:ASRtLtvd99Cahd4tC9w1CPwDvt3uFlDz
                                                        MD5:51E8A5281C2092E45D8C97FBDBF39560
                                                        SHA1:C499C810ED83AAADCE3B267807E593EC6B121211
                                                        SHA-256:2A234B5AA20C3FAECF725BBB54FB33F3D94543F78FA7045408E905593E49960A
                                                        SHA-512:98B91719B0975CB38D3B3C7B6F820D184EF1B64D38AD8515BE0B8B07730E2272376B9E51631FE9EFD9B8A1709FEA214CF3F77B34EEB9FD282EB09E395120E7CB
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./',.kFB.kFB.kFB.b>..yFB..:C.iFB..:G.gFB..:F.cFB..:A.oFB.kFC..FB. >C.`FB.;A.KFB.;F..EB.;B.jFB.;..jFB.;@.jFB.RichkFB.........................PE..d...x..e.........." ...#..6..*......v.........................................O.......O...`.........................................0.G.0.....M.@....0N.|.....K.\.....N../...@N.....PsC.8............................qC.@.............M..............................text...4.6.......6................. ..`.rdata..`.....6.......6.............@..@.data....n....J..<....J.............@....pdata........K.......J.............@..@.idata...%....M..&....M.............@..@.00cfg..u.... N.......M.............@..@.rsrc...|....0N.......M.............@..@.reloc..k....@N.......M.............@..B................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):39696
                                                        Entropy (8bit):6.641880464695502
                                                        Encrypted:false
                                                        SSDEEP:768:NiQfxQemQJNrPN+moyijAc5YiSyvkIPxWEqG:dfxIQvPkmoyijP7SytPxF
                                                        MD5:0F8E4992CA92BAAF54CC0B43AACCCE21
                                                        SHA1:C7300975DF267B1D6ADCBAC0AC93FD7B1AB49BD2
                                                        SHA-256:EFF52743773EB550FCC6CE3EFC37C85724502233B6B002A35496D828BD7B280A
                                                        SHA-512:6E1B223462DC124279BFCA74FD2C66FE18B368FFBCA540C84E82E0F5BCBEA0E10CC243975574FA95ACE437B9D8B03A446ED5EE0C9B1B094147CEFAF704DFE978
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".H...(.......L...............................................n....`......................................... l.......p..P...............P....l.../......,...@d...............................c..@............`.. ............................text....G.......H.................. ..`.rdata..h....`.......L..............@..@.data................b..............@....pdata..P............d..............@..@.reloc..,............j..............@..B................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):790296
                                                        Entropy (8bit):5.607732992846443
                                                        Encrypted:false
                                                        SSDEEP:6144:7aO1lo7USZGjweMMHO4+xuVg7gCl2VdhMd1DdwMVn4TERUr3zgKpJJ/wknofFe9A:FkeMKOr97gCAE35gEGzLpwknofFe9XbE
                                                        MD5:BFC834BB2310DDF01BE9AD9CFF7C2A41
                                                        SHA1:FB1D601B4FCB29FF1B13B0D2ED7119BD0472205C
                                                        SHA-256:41AD1A04CA27A7959579E87FBBDA87C93099616A64A0E66260C983381C5570D1
                                                        SHA-512:6AF473C7C0997F2847EBE7CEE8EF67CD682DEE41720D4F268964330B449BA71398FDA8954524F9A97CC4CDF9893B8BDC7A1CF40E9E45A73F4F35A37F31C6A9C3
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........T..T..T..].3.Z....V......V....X....\....P....W..T..I....e....U.._.U....U..RichT..........PE..d......e.........." ...#.6..........K........................................0.......w....`..........................................w...Q..............s.... ..pM......./......`... ...8...............................@............................................text....4.......6.................. ..`.rdata...y...P...z...:..............@..@.data....N.......H..................@....pdata..XV... ...X..................@..@.idata..bc.......d...T..............@..@.00cfg..u...........................@..@.rsrc...s...........................@..@.reloc..?...........................@..B................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):27
                                                        Entropy (8bit):3.9265716511782736
                                                        Encrypted:false
                                                        SSDEEP:3:SZeW0FOoc:SZeRFHc
                                                        MD5:48734178084EF7F5C250997C28F8BDEE
                                                        SHA1:4D7BB7A1D9B08B32C6FFBAFCE440959D0BC19788
                                                        SHA-256:6D67B0F661E0332F0BA8CBBB46EA905C55CB071876091C747546D2C7EDF0138F
                                                        SHA-512:A227E9E2B7FC025767B4363544B4C4A675A123A853E68C740E659E662C354030F655B8FDA1D6CDF57B58CCA32A4757195F76D7A4A93048D334F047E7693F3335
                                                        Malicious:false
                                                        Preview:# Marker file for PEP 561..
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):8192
                                                        Entropy (8bit):5.097279386012455
                                                        Encrypted:false
                                                        SSDEEP:192:RC/PE+flkDFk4kVOAUAIXYP9laqCFd5zJ007:R4E65uYPVCFLzJ
                                                        MD5:0C5517AB8EDB22EA7A61E44B28E96DA7
                                                        SHA1:F902EE7E96CE48DE6404ADF644FA40E260D949FF
                                                        SHA-256:5C5942792BD8340CB8B27CD592F1015EDF56A8C5B26276EE18A482428E7C5726
                                                        SHA-512:F5B6D696A6B75BDEEACD0E0742D31EAA06CD683BB3C149052D82E0D47039534B23C82FC47FB193C86FF2B7C2B22F73CCC48CC500F09ABC5E228998D9BC413EF7
                                                        Malicious:false
                                                        Preview:....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):8192
                                                        Entropy (8bit):5.099678321615091
                                                        Encrypted:false
                                                        SSDEEP:192:UPmINi9ODjMzdZmIBI3C8+o95uECRdDGrRPY2+PDv:Ucfz7lqyHo9RCz2wLPDv
                                                        MD5:00D0909E346B52006D1E9EF680B5A5FC
                                                        SHA1:33E401BEA63F83A5EA84D78DDC7161809EF77F0B
                                                        SHA-256:417B26B3D8500A4AE3D59717D7011952DB6FC2FB84B807F3F94AC734E89C1B5F
                                                        SHA-512:1E2689A48317A12A6B4A6A74DE2241380FEF57B250FAFE6AB00A479DB85D12661F8C33749240C9CEC6535ACD7F91E71DCBA0BB8A27D1D32A3B76FE34797CAD5B
                                                        Malicious:false
                                                        Preview:....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):14945
                                                        Entropy (8bit):4.229683397391918
                                                        Encrypted:false
                                                        SSDEEP:384:6kfPbFvdXqyyLlY3fIVKj7KyvKxv/FjZ305yyRvQcR5bJw:lbrXqyyLS31/Kyviv/FaAyttR59w
                                                        MD5:38FD5E100D4604C2A844BB9BB9305975
                                                        SHA1:33A09B9BC987AAA8560FFEF8A17459C99C63ED4A
                                                        SHA-256:7E80E161C3E93D9554C2EFB78D4E3CEBF8FC727E9C52E03B83B94406BDCC95FC
                                                        SHA-512:3D56A9D507B5B07A99B9D9924D8540944DD226D4B5050852027F09309A85513DB2E57C9186F70B8F8226C342C28EFCEDD1E8EDD507E1D39F8DA693CFAC0C39CA
                                                        Malicious:false
                                                        Preview:abdikace.abeceda.adresa.agrese.akce.aktovka.alej.alkohol.amputace.ananas.andulka.anekdota.anketa.antika.anulovat.archa.arogance.asfalt.asistent.aspirace.astma.astronom.atlas.atletika.atol.autobus.azyl.babka.bachor.bacil.baculka.badatel.bageta.bagr.bahno.bakterie.balada.baletka.balkon.balonek.balvan.balza.bambus.bankomat.barbar.baret.barman.baroko.barva.baterka.batoh.bavlna.bazalka.bazilika.bazuka.bedna.beran.beseda.bestie.beton.bezinka.bezmoc.beztak.bicykl.bidlo.biftek.bikiny.bilance.biograf.biolog.bitva.bizon.blahobyt.blatouch.blecha.bledule.blesk.blikat.blizna.blokovat.bloudit.blud.bobek.bobr.bodlina.bodnout.bohatost.bojkot.bojovat.bokorys.bolest.borec.borovice.bota.boubel.bouchat.bouda.boule.bourat.boxer.bradavka.brambora.branka.bratr.brepta.briketa.brko.brloh.bronz.broskev.brunetka.brusinka.brzda.brzy.bublina.bubnovat.buchta.buditel.budka.budova.bufet.bujarost.bukvice.buldok.bulva.bunda.bunkr.burza.butik.buvol.buzola.bydlet.bylina.bytovka.bzukot.capart.carevna.cedr.cedule.cejch.cej
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):13116
                                                        Entropy (8bit):4.2192956006819475
                                                        Encrypted:false
                                                        SSDEEP:192:DAvLtKog3W8jiD1/oLpsExUKqlyjn6SybkSoxIFg/7mSX30hB8OnqdE5HpF2gS2:MvLAog/I1wdsExXxigaSUvRj5r
                                                        MD5:F23506956964FA69C98FA3FB5C8823B5
                                                        SHA1:B2D5241AE027A0E40F06A33D909809A190F210FE
                                                        SHA-256:2F5EED53A4727B4BF8880D8F3F199EFC90E58503646D9FF8EFF3A2ED3B24DBDA
                                                        SHA-512:416C71BA30018EA292BB36CDC23C9329673485A8D8933266A9D9A7CC72153B8BAED3D430F52EAB4F5D3ADDF6583611B3777A50454599F1E42716F5F879621123
                                                        Malicious:false
                                                        Preview:abandon.ability.able.about.above.absent.absorb.abstract.absurd.abuse.access.accident.account.accuse.achieve.acid.acoustic.acquire.across.act.action.actor.actress.actual.adapt.add.addict.address.adjust.admit.adult.advance.advice.aerobic.affair.afford.afraid.again.age.agent.agree.ahead.aim.air.airport.aisle.alarm.album.alcohol.alert.alien.all.alley.allow.almost.alone.alpha.already.also.alter.always.amateur.amazing.among.amount.amused.analyst.anchor.ancient.anger.angle.angry.animal.ankle.announce.annual.another.answer.antenna.antique.anxiety.any.apart.apology.appear.apple.approve.april.arch.arctic.area.arena.argue.arm.armed.armor.army.around.arrange.arrest.arrive.arrow.art.artefact.artist.artwork.ask.aspect.assault.asset.assist.assume.asthma.athlete.atom.attack.attend.attitude.attract.auction.audit.august.aunt.author.auto.autumn.average.avocado.avoid.awake.aware.away.awesome.awful.awkward.axis.baby.bachelor.bacon.badge.bag.balance.balcony.ball.bamboo.banana.banner.bar.barely.bargain.barre
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):16777
                                                        Entropy (8bit):4.213242727095934
                                                        Encrypted:false
                                                        SSDEEP:384:6J+AAri16KDuR4ckw3ezywsNB7CJEu4XjooTiOPMk8YTCm:6IAYi16muR4GezyhNB7r0HG8EP
                                                        MD5:F5905FD22FD0DEB0BE40F356204BA3FB
                                                        SHA1:BCD81ED81906BDAB57D9700A23413A7E22487D0E
                                                        SHA-256:EBC3959AB7801A1DF6BAC4FA7D970652F1DF76B683CD2F4003C941C63D517E59
                                                        SHA-512:001B2E7D1D17416776FA5306E4F7EC5812F3F35CC26FDE46800A7DAB1412870AC8B779B0C2FEC1D75C24B80868E55BC5BFB88C8DED50C84040248B76A2C5332D
                                                        Malicious:false
                                                        Preview:abaisser.abandon.abdiquer.abeille.abolir.aborder.aboutir.aboyer.abrasif.abreuver.abriter.abroger.abrupt.absence.absolu.absurde.abusif.abyssal.acade.mie.acajou.acarien.accabler.accepter.acclamer.accolade.accroche.accuser.acerbe.achat.acheter.aciduler.acier.acompte.acque.rir.acronyme.acteur.actif.actuel.adepte.ade.quat.adhe.sif.adjectif.adjuger.admettre.admirer.adopter.adorer.adoucir.adresse.adroit.adulte.adverbe.ae.rer.ae.ronef.affaire.affecter.affiche.affreux.affubler.agacer.agencer.agile.agiter.agrafer.agre.able.agrume.aider.aiguille.ailier.aimable.aisance.ajouter.ajuster.alarmer.alchimie.alerte.alge.bre.algue.alie.ner.aliment.alle.ger.alliage.allouer.allumer.alourdir.alpaga.altesse.alve.ole.amateur.ambigu.ambre.ame.nager.amertume.amidon.amiral.amorcer.amour.amovible.amphibie.ampleur.amusant.analyse.anaphore.anarchie.anatomie.ancien.ane.antir.angle.angoisse.anguleux.animal.annexer.annonce.annuel.anodin.anomalie.anonyme.anormal.antenne.antidote.anxieux.apaiser.ape.ritif.a
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):16033
                                                        Entropy (8bit):4.007887655086134
                                                        Encrypted:false
                                                        SSDEEP:384:7TRlelKQfV+XsNs6d6NN5Qd3kR72+ImtKlhT3sdHy1WVO0iiG:7TmBtP7dwN5Qpi4lG1VO0a
                                                        MD5:FBE635509A2859B7B6DE2C0F16F15ED8
                                                        SHA1:C6214EB1CEC7B1EE8CBA1F317AC612C51881448A
                                                        SHA-256:D392C49FDB700A24CD1FCEB237C1F65DCC128F6B34A8AACB58B59384B5C648C2
                                                        SHA-512:D3DCA24CF03F04EEA1872D98C91748A8AA7AEAC6E2C885A99F2D452904A75FFCF271506DB369335726C0E3F7C8A6454935782586414B9AFFD2FE0EB004223DA1
                                                        Malicious:false
                                                        Preview:abaco.abbaglio.abbinato.abete.abisso.abolire.abrasivo.abrogato.accadere.accenno.accusato.acetone.achille.acido.acqua.acre.acrilico.acrobata.acuto.adagio.addebito.addome.adeguato.aderire.adipe.adottare.adulare.affabile.affetto.affisso.affranto.aforisma.afoso.africano.agave.agente.agevole.aggancio.agire.agitare.agonismo.agricolo.agrumeto.aguzzo.alabarda.alato.albatro.alberato.albo.albume.alce.alcolico.alettone.alfa.algebra.aliante.alibi.alimento.allagato.allegro.allievo.allodola.allusivo.almeno.alogeno.alpaca.alpestre.altalena.alterno.alticcio.altrove.alunno.alveolo.alzare.amalgama.amanita.amarena.ambito.ambrato.ameba.america.ametista.amico.ammasso.ammenda.ammirare.ammonito.amore.ampio.ampliare.amuleto.anacardo.anagrafe.analista.anarchia.anatra.anca.ancella.ancora.andare.andrea.anello.angelo.angolare.angusto.anima.annegare.annidato.anno.annuncio.anonimo.anticipo.anzi.apatico.apertura.apode.apparire.appetito.appoggio.approdo.appunto.aprile.arabica.arachide.aragosta.araldica.arancio.aratur
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):26423
                                                        Entropy (8bit):3.554983747162495
                                                        Encrypted:false
                                                        SSDEEP:768:OwUkxkf27FkrH9tW/JgODfFFuHgFFqfw8QCBdqLMCl:Ogxkf27FkrdtW/JgOD9FuHgFFqfwLidW
                                                        MD5:C71FCA9FD3FE9F85514CB38A58859DE2
                                                        SHA1:A4EC1DA6C11A8C251195C7AD90817DDA6FE64488
                                                        SHA-256:2EED0AEF492291E061633D7AD8117F1A2B03EB80A29D0E4E3117AC2528D05FFD
                                                        SHA-512:3FAF87F7E48EB6635F7D7B18A34E7DACBC2C43A1CF6AA9C96015B2A3549710B8B7A0961E5D2E32D7E369099DB89A874C4D761A8384FB558744C7F47CA8CB0772
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):37832
                                                        Entropy (8bit):3.7380887691649907
                                                        Encrypted:false
                                                        SSDEEP:384:m57ktAhYlpH/gN8G3Ufyy7+Lp5vx5fBECMLJbnSTyKeeHjbnHeRigUuVyS+sOpVl:MSWhGES2O/r6
                                                        MD5:EC271D4926B82EF5C02AEFA7DD2DAAF4
                                                        SHA1:6C5C5F38E75673D1CEA20F2700468ADC163D869B
                                                        SHA-256:9E95F86C167DE88F450F0AAF89E87F6624A57F973C67B516E338E8E8B8897F60
                                                        SHA-512:E645A1E0F26F2727A8FB7605D3B59668A670C9DF04D07576FE473D844A23D0192020AEDC286FBB9B1F64709AD30E6ACB825803CF9F872954C1324AEFD4977710
                                                        Malicious:false
                                                        Preview:..................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):15671
                                                        Entropy (8bit):4.053540036444415
                                                        Encrypted:false
                                                        SSDEEP:384:XM3AG0Qk5DN0Wf3MmmzpjbdU5nTEHkYk0h3Vcf+VDG:c3AQMJ0Wf3HWby5QHkY9Vcf+tG
                                                        MD5:05EE6FDE129776830351BBACD5B0DCFB
                                                        SHA1:472727867B394A1C9168690C415B0094DC3A3383
                                                        SHA-256:2685E9C194C82AE67E10BA59D9EA5345A23DC093E92276FC5361F6667D79CD3F
                                                        SHA-512:0E6AA42870C6F9A77BDA0931EA9423FEBFFEFBEB49E9DBDA5FA732FC3479942629050517FEF57BB1A76026195E16785186C0CFE26261C8FCC31F52FE69BEDA0F
                                                        Malicious:false
                                                        Preview:abacate.abaixo.abalar.abater.abduzir.abelha.aberto.abismo.abotoar.abranger.abreviar.abrigar.abrupto.absinto.absoluto.absurdo.abutre.acabado.acalmar.acampar.acanhar.acaso.aceitar.acelerar.acenar.acervo.acessar.acetona.achatar.acidez.acima.acionado.acirrar.aclamar.aclive.acolhida.acomodar.acoplar.acordar.acumular.acusador.adaptar.adega.adentro.adepto.adequar.aderente.adesivo.adeus.adiante.aditivo.adjetivo.adjunto.admirar.adorar.adquirir.adubo.adverso.advogado.aeronave.afastar.aferir.afetivo.afinador.afivelar.aflito.afluente.afrontar.agachar.agarrar.agasalho.agenciar.agilizar.agiota.agitado.agora.agradar.agreste.agrupar.aguardar.agulha.ajoelhar.ajudar.ajustar.alameda.alarme.alastrar.alavanca.albergue.albino.alcatra.aldeia.alecrim.alegria.alertar.alface.alfinete.algum.alheio.aliar.alicate.alienar.alinhar.aliviar.almofada.alocar.alpiste.alterar.altitude.alucinar.alugar.aluno.alusivo.alvo.amaciar.amador.amarelo.amassar.ambas.ambiente.ameixa.amenizar.amido.amistoso.amizade.amolador.amontoar.a
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):26538
                                                        Entropy (8bit):3.827508989563015
                                                        Encrypted:false
                                                        SSDEEP:384:ou+5yukI02DpvaXhg8CnLOTsPsyOB7lanqA1p6tut/Mf2:H+5SIjDpvaXhrUSTsPsBBpand7xxMf2
                                                        MD5:8950901A308B43D263E31A377306D987
                                                        SHA1:7792B55B1838FAA8928C2528D304C2044ECD87BF
                                                        SHA-256:07F11AF3F07FD13D8D74859F4448D8BCA8F1D9D336DC4842531ECEA083103A26
                                                        SHA-512:5B747B7345E23F34DAFB35AFD9C2CB66AAD51456A7ACCBD9BF9CA7C285498A74C50647DA4D553AF763505935E1519F61204DB87D998B09583CC2585C91833B6B
                                                        Malicious:false
                                                        Preview:.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):13996
                                                        Entropy (8bit):4.187487403267613
                                                        Encrypted:false
                                                        SSDEEP:384:7SvbJ9E182qrUD0py4gnW6ji3Jl3ggHQqy8:s9ET1DsyXnne3xX
                                                        MD5:5171EE312F7709BEC7660BC9AC07351A
                                                        SHA1:B99205D24970E0ADA8E2182A1A68F1EB439C95A1
                                                        SHA-256:46846A5A0139D1E3CB77293E521C2865F7BCDB82C44E8D0A06A2CD0ECBA48C0B
                                                        SHA-512:0E838229265DE6C80505088682D2DC9510147C3AB1713B556B594D09529B493CC3A7E391AD690DDA2052D4E11C56572F8A215A7FFFDB2630B13B4637329F3C31
                                                        Malicious:false
                                                        Preview:a.baco.abdomen.abeja.abierto.abogado.abono.aborto.abrazo.abrir.abuelo.abuso.acabar.academia.acceso.accio.n.aceite.acelga.acento.aceptar.a.cido.aclarar.acne..acoger.acoso.activo.acto.actriz.actuar.acudir.acuerdo.acusar.adicto.admitir.adoptar.adorno.aduana.adulto.ae.reo.afectar.aficio.n.afinar.afirmar.a.gil.agitar.agoni.a.agosto.agotar.agregar.agrio.agua.agudo.a.guila.aguja.ahogo.ahorro.aire.aislar.ajedrez.ajeno.ajuste.alacra.n.alambre.alarma.alba.a.lbum.alcalde.aldea.alegre.alejar.alerta.aleta.alfiler.alga.algodo.n.aliado.aliento.alivio.alma.almeja.almi.bar.altar.alteza.altivo.alto.altura.alumno.alzar.amable.amante.amapola.amargo.amasar.a.mbar.a.mbito.ameno.amigo.amistad.amor.amparo.amplio.ancho.anciano.ancla.andar.ande.n.anemia.a.ngulo.anillo.a.nimo.ani.s.anotar.antena.antiguo.antojo.anual.anular.anuncio.an.adir.an.ejo.an.o.apagar.aparato.apetito.apio.aplicar.apodo.aporte.apoyo.aprender.aprobar.apuesta.apuro.arado.aran.a.arar.a.rbitro.a.rbol.arbusto.archivo.arc
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):15324
                                                        Entropy (8bit):4.562888468144625
                                                        Encrypted:false
                                                        SSDEEP:384:RyHE73AnXs3FzmzZIPXJBmqM0yHvnWMGRUIHF3N09GU:RWE7QnX6PPX7M0yPnvGHl3N0GU
                                                        MD5:BA9ADCC5210C101DF4B26871504F253D
                                                        SHA1:C0AEDCD8297FB58456C0A60854E04B547DFC9576
                                                        SHA-256:A7DC9C77913726106C7B8BAA022B7E17601D118ACF40AA60AB1FBC9C91B383AC
                                                        SHA-512:D16BADD39006E06FC5AD03AA7AA622ED19A19271E300061183BFA7A2F913919E8A0C831BC74FA3E6DEE1EC35AF01AC904D2617EC3EF7DFA3FADE6EBEF788E218
                                                        Malicious:false
                                                        Preview:abajur.abak.s.abart..abdal.abdest.abiye.abluka.abone.absorbe.abs.rt.acayip.acele.acemi.a..kg.z.adalet.adam.adezyon.adisyon.adliye.adres.afacan.afili.afi..afiyet.aforizm.afra.a.a..a..r.ahbap.ahkam.ahlak.ahtapot.aidat.aile.ajan.akademi.akarsu.akba..akci.er.akdeniz.ak.bet.ak.l.ak.nt..akide.akrep.akrobasi.aksiyon.ak.am.aktif.akt.r.aktris.akustik.alaca.alb.m.al.ak.aldanma.aleni.alet.alfabe.alg.lama.al.ngan.alk...alkol.alpay.alperen.alt.n.alt.st.altyap..alyuvar.amade.amat.r.amazon.ambalaj.amblem.ambulans.amca.amel.amigo.amir.amiyane.amorti.ampul.anadolu.anahtar.anakonda.anaokul.anapara.anar.i.anatomi.anayasa.anekdot.anestezi.angaje.anka.anket.anlaml..anne.anomali.anonim.anten.antla.ma.apse.araba.arac..araf.arbede.arda.arefe.arena.argo.arg.man.arkada..armoni.aroma.arsa.ars.z.art..artist.aruz.asans.r.asayi..asfalt.asgari.asil.asker.ask..aslan.asosyal.astsubay.asya.a....a..r..a.ure.atabey.ataman.ate..atmaca.atmosfer.atom.at.lye.avc..avdet.avize.
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):67072
                                                        Entropy (8bit):5.909510426434191
                                                        Encrypted:false
                                                        SSDEEP:1536:aJsHmR02IvVxv7WCyKm7c5Th4MBHTOvyyaZE:apIvryCyKx5Th4M5OvyyO
                                                        MD5:3E579844160DE8322D574501A0F91516
                                                        SHA1:C8DE193854F7FC94F103BD4AC726246981264508
                                                        SHA-256:95F01CE7E37F6B4B281DBC76E9B88F28A03CB02D41383CC986803275A1CD6333
                                                        SHA-512:EE2A026E8E70351D395329C78A07ACB1B9440261D2557F639E817A8149BA625173EF196AED3D1C986577D78DC1A7EC9FED759C19346C51511474FE6D235B1817
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......nT..*5..*5..*5..#M2. 5..x@..(5..x@..&5..x@.."5..x@...5...k..(5..aM..;5..*5...5...@..:5...@..+5...@^.+5...@..+5..Rich*5..................PE..d.....qf.........." .........h......\........................................@............`.........................................0...`.......@.... .......................0..(.......................................8............................................text...h........................... ..`.rdata..\I.......J..................@..@.data...x...........................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..(....0......................@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):67352
                                                        Entropy (8bit):6.146958413069333
                                                        Encrypted:false
                                                        SSDEEP:768:Hw/EsYpkVgBaz57kcDA7QKFmpz7cnzH/ks/KF61xubwmB1Cf//yhC74JFmpktJSG:Q/5k8cnzeJlJIyL0T7Sydix3
                                                        MD5:FF319D24153238249ADEA18D8A3E54A7
                                                        SHA1:0474FAA64826A48821B7A82AD256525AA9C5315E
                                                        SHA-256:A462A21B5F0C05F0F7EC030C4FDE032A13B34A8576D661A8E66F9AD23767E991
                                                        SHA-512:0E63FE4D5568CD2C54304183A29C7469F769816F517CD2D5B197049AA966C310CC13A7790560EF2EDC36B9B6D99FF586698886F906E19645FAEB89B0E65ADFDD
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........T...5e..5e..5e..m..5e..e..5e.....5e..g..5e.Rich.5e.........PE..d....'ne.........." ...%............................................................r.....`.........................................`...P................................/..............T............................................................................rdata..............................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5785880
                                                        Entropy (8bit):6.090091140780886
                                                        Encrypted:false
                                                        SSDEEP:98304:0asy3088wAPo8yN4yl57G+160THIM1uFvvBnTfDyY:hsy3088wAPo8pyl57G81GrOY
                                                        MD5:86E0AD6BA8A9052D1729DB2C015DAF1C
                                                        SHA1:48112072903FFF2EC5726CCA19CC09E42D6384C7
                                                        SHA-256:5ECDA62F6FD2822355C560412F6D90BE46A7F763F0FFEEC9854177904632AC2D
                                                        SHA-512:5D6E32F9FF90A9A584183DAD1583AEA2327B4AEA32184B0EBBEC3DF41B0B833E6BB3CD40822DD64D1033125F52255812B17E4FA0ADD38FCDA6BAB1724DFAA2EB
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........b..|...|...|.......|.......|.......|.......|.......|.......|......|...|..}.......|.......|.......|.......|..Rich.|..........................PE..d....'ne.........." ...%..%..L7......u.......................................0].....*.X...`...........................................@.......A.......[.......W..2....X../....[.tD....*.T.............................*.@.............%..............................text....%.......%................. ..`.rdata........%.......%.............@..@.data... #....A..T....A.............@....pdata...2....W..4....R.............@..@PyRuntim.....@Y......>T.............@....rsrc.........[.......V.............@..@.reloc..tD....[..F....V.............@..B........................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):30488
                                                        Entropy (8bit):6.584716253229207
                                                        Encrypted:false
                                                        SSDEEP:384:aEeecReGLnUC0HqGn57AvB0NJIyQGdHQIYiSy1pCQUNIeAM+o/8E9VF0NylE3X:SeUeW4HqIG+JIyQGB5YiSyv2AMxkEg3X
                                                        MD5:0B55F18218F4C8F30105DB9F179AFB2C
                                                        SHA1:F1914831CF0A1AF678970824F1C4438CC05F5587
                                                        SHA-256:E7FE45BAEF9CEE192C65FCFCE1790CCB6F3F9B81E86DF82C08F838E86275AF02
                                                        SHA-512:428EE25E99F882AF5AD0DEDF1CCDBEB1B4022AC286AF23B209947A910BF02AE18A761F3152990C84397649702D8208FED269AA3E3A3C65770E21EE1EEC064CC1
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V..t.s.'.s.'.s.'..7'.s.'...&.s.'...&.s.'...&.s.'...&.s.'(.&.s.'.s.'Ps.'Y..&.s.'(.&.s.'(.&.s.'(.['.s.'(.&.s.'Rich.s.'........PE..d....'ne.........." ...%.....2.......................................................-....`..........................................@..L...,A..x....p.......`.......H.../......L....3..T............................2..@............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......6..............@....pdata.......`.......8..............@..@.rsrc........p.......<..............@..@.reloc..L............F..............@..B................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1141016
                                                        Entropy (8bit):5.435101785627634
                                                        Encrypted:false
                                                        SSDEEP:12288:3YPYbfjwR6nbkonRiPDjRrO5184EPYPx++ZiLKGZ5KXyVH4eDqLo:3aYbMR0IDJcjEwPgPOG6Xyd46qLo
                                                        MD5:D4323AC0BAAB59AED34C761F056D50A9
                                                        SHA1:843687689D21EDE9818C6FC5F3772BCF914F8A6E
                                                        SHA-256:71D27537EB1E6DE76FD145DA4FDCBC379DC54DE7854C99B2E61AAE00109C13D0
                                                        SHA-512:E31D071CE920B3E83C89505DFA22B2D0F09D43C408FCADBC910F021481C4A53C47919FCE0215AE61F00956DCB7171449EABDA8EEF63A6FDD47AA13C7158577BE
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........L..L..L..E.q.J..Y..N..Y..A..Y..D..Y..O..vE.O.....N..L.....vE.M..vE.M..vE..M..vE..M..RichL..........................PE..d....'ne.........." ...%.@..........P*....................................................`.............................................X............`.......P..0....:.../...p.......]..T............................[..@............P..x............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data...H....0......................@....pdata..0....P.......&..............@..@.rsrc........`......................@..@.reloc.......p.......8..............@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5701632
                                                        Entropy (8bit):7.7339181361147675
                                                        Encrypted:false
                                                        SSDEEP:98304:MC1R5Ydjykb9bMC9HLoR0OV/rLu4zFEuifdcpUaRMHt:M8kb9AClufpwfdcWaRMH
                                                        MD5:4781C53D9BB1CB237B653C687028203D
                                                        SHA1:16A27B614D5EB2500C1CBE0AA25048D27363598F
                                                        SHA-256:2B6AE672822198B68503B3D37D12025C9D4FC1B7E24ED833F349ECC6FBBFC655
                                                        SHA-512:6D7B70CBD775598674D85F01B69F3BE038B4BF95C8F222C2B7C38E1EC7D379CD747B37DBF50DF0440DBB771A85D67C2324B80682CF569F0AA41703D03054AD94
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 79%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Jd...............&......V................@..............................W.......W...`... ...............................................W.4....@W..-....V.|............pW.0........................... .V.(.....................W.P............................text...............................`..`.data.....T.......T.................@....rdata...7....V..8...dV.............@..@.pdata..|.....V.......V.............@..@.xdata........V.......V.............@..@.bss..........V..........................idata..4.....W.......V.............@....CRT....`.... W.......V.............@....tls.........0W.......V.............@....rsrc....-...@W.......V.............@....reloc..0....pW.......V.............@..B........................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):119192
                                                        Entropy (8bit):6.6016214745004635
                                                        Encrypted:false
                                                        SSDEEP:1536:+qvQ1Dj2DkX7OcujarvmdlYNABCmgrP4ddbkZIecbWcFML/UXzlghzdMFw84hzk:+qvQ1D2CreiABCmgYecbWVLUD6h+b4ho
                                                        MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
                                                        SHA1:A19F08BB2B1C1DE5BB61DAF9F2304531321E0E40
                                                        SHA-256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
                                                        SHA-512:0DA644472B374F1DA449A06623983D0477405B5229E386ACCADB154B43B8B083EE89F07C3F04D2C0C7501EAD99AD95AECAA5873FF34C5EEB833285B598D5A655
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.../c../c../c._]b./c..W.../c../b./c../c../c...`./c...g./c...f./c...c./c....../c...a./c.Rich./c.........................PE..d.....cW.........." ...&. ...d......................................................-.....`A.........................................e..4...4m...........................O...........N..p............................L..@............0...............................text...&........................... ..`fothk........ ...................... ..`.rdata..\C...0...D...$..............@..@.data...p............h..............@....pdata...............l..............@..@_RDATA...............x..............@..@.rsrc................z..............@..@.reloc...............~..............@..B................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):84760
                                                        Entropy (8bit):6.5692755156011025
                                                        Encrypted:false
                                                        SSDEEP:1536:cfz7OThu5JLlHRGxlDAwGzzVXU8dhkb48UlIyCVJ7SyMxD:cfzSFlDlCHdhkmlIyCVJU
                                                        MD5:AFAA11704FDA2ED686389080B6FFCB11
                                                        SHA1:9A9C83546C2E3B3CCF823E944D5FD07D22318A1B
                                                        SHA-256:AB34B804DA5B8E814B2178754D095A4E8AEAD77EEFD3668DA188769392CDB5F4
                                                        SHA-512:DE23BB50F1D416CF4716A5D25FE12F4B66E6226BB39E964D0DE0FEF1724D35B48C681809589C731D3061A97C62B4DC7B9B7DFE2978F196F2D82CCCE286BE8A2A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<..R..R..R......R...S..R.....R...W..R...V..R...Q..R...S..R..S..R..S..R..._..R...R..R......R...P..R.Rich.R.........................PE..d....(ne.........." ...%.....^...............................................P.......i....`.........................................p...H............0....... .. ......../...@..........T...........................p...@............................................text...7........................... ..`.rdata..L>.......@..................@..@.data...............................@....pdata.. .... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):124696
                                                        Entropy (8bit):6.043702317006711
                                                        Encrypted:false
                                                        SSDEEP:3072:DJMe7jc823LQHUlYsNZfLIbKV6pJfJIyLPKZ:DWeoL0GNZfLIbCcJfi
                                                        MD5:78DF76AA0FF8C17EDC60376724D206CD
                                                        SHA1:9818BD514D3D0FC1749B2D5EF9E4D72D781B51DD
                                                        SHA-256:B75560DB79BA6FB56C393A4886EEDD72E60DF1E2F7F870FE2E356D08155F367B
                                                        SHA-512:6189C1BD56DB5B7A9806960BC27742D97D2794ACEBC32E0A5F634FE0FF863E1775DCF90224504D5E2920A1192A3C1511FB84D41D7A2B69C67D3BDFBAB2F968FA
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........X...X...X...Q.*.^...M...Z...M...T...M...P...M...\...b...Z.......Y.......^.......[...X.......b...^...b...Y...b.F.Y...b...Y...RichX...........PE..d....'ne.........." ...%.............\..............................................\.....`..........................................Q.......Q..................P......../..............T...........................`...@............................................text............................... ..`.rdata..2m.......n..................@..@.data...$=...p...8...`..............@....pdata..P...........................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):253720
                                                        Entropy (8bit):6.556660448912721
                                                        Encrypted:false
                                                        SSDEEP:6144:JFrhZMm47r6aA2MQbPS4ELT4zH2n9qWM53pLW1A+tARs4:JFrhV4qaA2ffEozWa0ARD
                                                        MD5:33F721F1CBB413CD4F26FE0ED4A597E7
                                                        SHA1:476D5FAB7B2DB3F53B90B7CC6099D5541E72883E
                                                        SHA-256:080D0FBBFF68D17B670110C95210347BE7B8AB7C385F956F123A66DC2F434AB3
                                                        SHA-512:8FBC82AF0FE063C4EB8FDEFAE5650924AC607BE54B81C4D51064CA720BB85BFC9E1705BA93DF5BE6ADD156A6B360DD1F700618862877E28DE7C13E21B470B507
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........mBP\.,.\.,.\.,.Ut..R.,.Is-.^.,.Is).Q.,.Is(.T.,.Is/.X.,.f.-._.,..t-.^.,.\.-...,.f./.].,.f.!.S.,.f.,.].,.f...].,.f...].,.Rich\.,.........PE..d....'ne.........." ...%.x...<............................................................`..........................................T..P....T..................`'......./......P.......T...........................p...@............................................text...5w.......x.................. ..`.rdata...............|..............@..@.data....*...p...$...T..............@....pdata..`'.......(...x..............@..@.rsrc...............................@..@.reloc..P...........................@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):65304
                                                        Entropy (8bit):6.25487370026842
                                                        Encrypted:false
                                                        SSDEEP:1536:nuY1lTorKn+zF9G0pLOjWNBgdIyOI8f7SyxxUx:nuY+9GIOjiBgdIyOI8fY
                                                        MD5:534902BE1D8A57974EFD025AFF4F11EF
                                                        SHA1:1179C6153DC52F72C29FE1591DC9A889C2E229E9
                                                        SHA-256:30ADFB86513282E59D7E27968E1FF6686E43B8559994A50C17BE66D0789F82B3
                                                        SHA-512:7F0CDCF8576FAF30FC8104B9BC9586D85AD50B7803074A7BCAA192EED05B1E2BD988A91873554FB63F204FCAD86C667E95755C5FF13C43F96DC334EF3EA37240
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>@j.P.j.P.j.P.c...n.P...Q.h.P...U.f.P...T.b.P...S.i.P.PaQ.h.P.!.Q.h.P...Q.i.P.j.Q...P.Pa].k.P.PaP.k.P.Pa..k.P.PaR.k.P.Richj.P.........PE..d... (ne.........." ...%.T...~......0@..............................................a_....`.............................................P................................/......X...P}..T............................|..@............p..0............................text....S.......T.................. ..`.rdata..rO...p...P...X..............@..@.data...8...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..X...........................@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):159000
                                                        Entropy (8bit):6.852849132106876
                                                        Encrypted:false
                                                        SSDEEP:3072:Bl2grSWcJSEoLSHK/znfU9mNo2s2AaK5VlIyZ1Zxzp:Blh2nJ9a8YO2u7rp
                                                        MD5:2AE2464BFCC442083424BC05ED9BE7D2
                                                        SHA1:F64B100B59713E51D90D2E016B1FE573B6507B5D
                                                        SHA-256:64BA475A28781DCA81180A1B8722A81893704F8D8FAC0B022C846FDCF95B15B9
                                                        SHA-512:6C3ACD3DCAE733452AD68477417693AF64A7D79558E8EC9F0581289903C2412E2F29195B90E396BFDCD765337A6DEA9632E4B8D936AC39B1351CD593CB12CE27
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......RH...)t..)t..)t..Q...)t..Vu..)t..Vq..)t..Vp..)t..Vw..)t.,.u..)t.]Qu..)t..)u.p)t.,.y.,)t.,.t..)t.,....)t.,.v..)t.Rich.)t.................PE..d...#(ne.........." ...%.b..........P6....................................................`..........................................%..L...L%..x....p.......P.......>.../......8.......T...........................p...@............................................text....a.......b.................. ..`.rdata..............f..............@..@.data........@......................@....pdata.......P......................@..@.rsrc........p.......2..............@..@.reloc..8............<..............@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):32536
                                                        Entropy (8bit):6.445663619180805
                                                        Encrypted:false
                                                        SSDEEP:768:y+yFV6rXzmxU9JIyQUM5YiSyvKtp/AMxkEj:y+wEXzWU9JIyQU27Sy4xH
                                                        MD5:DBD3C2C0A348A44A96D76100690C606D
                                                        SHA1:04E901EAC1161255ADB16155459AC50F124B30A6
                                                        SHA-256:2BFD8459BA01C741D676F79EE96802FB2C29CB30F50301D67FDE8BBCE8E7E7D4
                                                        SHA-512:99FEE97C272BFFF4515407D588B2761AF7BE39A83BE070E01128FBA71FF75404FBAD6352BCDBE5465786CE86A6550F47B177D022CCB53F32F5A482DB61BEE3B4
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z2.X.Sa..Sa..Sa..+...Sa..,`..Sa..,d..Sa..,e..Sa..,b..Sa.$.`..Sa.U+`..Sa..S`.TSa.$.l..Sa.$.a..Sa.$...Sa.$.c..Sa.Rich.Sa.................PE..d....'ne.........." ...%.....8...........................................................`..........................................C..L....C..d....p.......`.......P.../..........p4..T...........................03..@............0..0............................text............................... ..`.rdata..R....0......................@..@.data...x....P.......<..............@....pdata.......`.......@..............@..@.rsrc........p.......D..............@..@.reloc...............N..............@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):79640
                                                        Entropy (8bit):6.288109761411876
                                                        Encrypted:false
                                                        SSDEEP:1536:sRbflgPFXDclujZ9/s+S+pzpGkTFVf7KJIyLw57SyCxz7:sDm1EujZ9/sT+pz0KFVTKJIyLw567
                                                        MD5:11B7936A5BD929CC76AC3F4F137B5236
                                                        SHA1:09CB712FA43DC008EB5185481A5080997AFF82AB
                                                        SHA-256:8956B11C07D08D289425E7240B8FA37841A27C435617DBBD02BFE3F9405F422B
                                                        SHA-512:7B050DF283A0AD4295A5BE47B99D7361F49A3CFD20691E201C5DA5349A9EB8F5710AB3A26A66D194567539660ED227411485F4EDF2269567A55A6B8CCFD71096
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........h...............q.......v.......v.......v.......v.......................q........................l.............Rich....................PE..d....(ne.........." ...%.l...........%.......................................P............`.............................................P............0....... ..x......../...@..........T...............................@............................................text....k.......l.................. ..`.rdata...t.......v...p..............@..@.data...............................@....pdata..x.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):176920
                                                        Entropy (8bit):5.956358505915276
                                                        Encrypted:false
                                                        SSDEEP:3072:hjIQQj5DC1z/39/2uXU6XjXylB9d43Olh59YL48PMrN/WgAlNiVlIyC7WN:Kj5mRPxbU6XjK4TLiVL
                                                        MD5:0E9E6D6839D74AD40BB9F16CC6601B13
                                                        SHA1:6671039088793F4BA42F5BD4409C26B1283CEAFA
                                                        SHA-256:BCA1F490C9F7BA25CBBB4B39785DDA8AA651123E22D4E7EDC299B218C8157A81
                                                        SHA-512:CB8742AE5DB83487C21BA17D9EFACA736DF49F8F3C4A72355EDE119717B83E0B4C6D94BD1C75A992ABAF4AB89502A805F81B2529E85FD6A656600D6E7B0C90F5
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............L...L...L..VL...L...M...L...M...L...M...L...M...L.f.M...Lc..M...L...L4..L..M...L.f.M...L.f.M...L.f:L...L.f.M...LRich...L........PE..d...#(ne.........." ...%............l+..............................................Y.....`.........................................0...d................................/......|...P...T...............................@............................................text.............................. ..`.rdata...".......$..................@..@.data...............................@....pdata...............\..............@..@.rsrc................h..............@..@.reloc..|............r..............@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                        Category:dropped
                                                        Size (bytes):1442277
                                                        Entropy (8bit):5.590680301756823
                                                        Encrypted:false
                                                        SSDEEP:24576:mQR5pATG8/R5lUKdcubgAnyfb6/X0iwhmdmzNPFa0HHp:mQR5pE/RJvG
                                                        MD5:81CD6D012885629791A9E3D9320C444E
                                                        SHA1:53268184FDBDDF8909C349ED3C6701ABE8884C31
                                                        SHA-256:A18892E4F2F2EC0DEE5714429F73A5ADD4E355D10A7BA51593AFC730F77C51DD
                                                        SHA-512:D5BF47FAD8B1F5C7DCAA6BEF5D4553E461F46E6C334B33D8ADC93689CF89365C318F03E961A5D33994730B72DC8BDE62209BACA015D0D2D08A081D82DF7DFD73
                                                        Malicious:false
                                                        Preview:PK..........!.h%..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):292541
                                                        Entropy (8bit):6.048162209044241
                                                        Encrypted:false
                                                        SSDEEP:6144:QW1x/M8fRR1jplkXURrVADwYCuCigT/Q5MSRqNb7d8iu5NF:QWb/TRJLWURrI55MWavdF0D
                                                        MD5:D3E74C9D33719C8AB162BAA4AE743B27
                                                        SHA1:EE32F2CCD4BC56CA68441A02BF33E32DC6205C2B
                                                        SHA-256:7A347CA8FEF6E29F82B6E4785355A6635C17FA755E0940F65F15AA8FC7BD7F92
                                                        SHA-512:E0FB35D6901A6DEBBF48A0655E2AA1040700EB5166E732AE2617E89EF5E6869E8DDD5C7875FA83F31D447D4ABC3DB14BFFD29600C9AF725D9B03F03363469B4C
                                                        Malicious:false
                                                        Preview:.# Issuer: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Subject: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Label: "GlobalSign Root CA".# Serial: 4835703278459707669005204.# MD5 Fingerprint: 3e:45:52:15:09:51:92:e1:b7:5d:37:9f:b1:87:29:8a.# SHA1 Fingerprint: b1:bc:96:8b:d4:f4:9d:62:2a:a8:9a:81:f2:15:01:52:a4:1d:82:9c.# SHA256 Fingerprint: eb:d4:10:40:e4:bb:3e:c7:42:c9:e3:81:d3:1e:f2:a4:1a:48:b6:68:5c:96:e7:ce:f3:c1:df:6c:d4:33:1c:99.-----BEGIN CERTIFICATE-----.MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG.A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv.b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw.MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i.YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT.aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ.jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp.xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):10752
                                                        Entropy (8bit):4.673454313041419
                                                        Encrypted:false
                                                        SSDEEP:96:KG+p72HzA5iJGhU2Y0hQMsQJCUCLsZEA4elh3XQMtCFliHUWQcX6g8cim1qeSju1:A2HzzU2bRYoeLHkcqgvimoe
                                                        MD5:723EC2E1404AE1047C3EF860B9840C29
                                                        SHA1:8FC869B92863FB6D2758019DD01EDBEF2A9A100A
                                                        SHA-256:790A11AA270523C2EFA6021CE4F994C3C5A67E8EAAAF02074D5308420B68BD94
                                                        SHA-512:2E323AE5B816ADDE7AAA14398F1FDB3EFE15A19DF3735A604A7DB6CADC22B753046EAB242E0F1FBCD3310A8FBB59FF49865827D242BAF21F44FD994C3AC9A878
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..............................M....................................... ...?.......?.......?.a.....?.......Rich............................PE..d...siAe.........." ...%.....................................................p............`..........................................'..p...`(..d....P.......@...............`..,...`#.............................. "..@............ ...............................text............................... ..`.rdata....... ......................@..@.data...8....0......."..............@....pdata.......@.......$..............@..@.rsrc........P.......&..............@..@.reloc..,....`.......(..............@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):119296
                                                        Entropy (8bit):5.872097486056729
                                                        Encrypted:false
                                                        SSDEEP:1536:OzgMw0g+m/+rxC9Jtd960WsCyqPD1/bZMlDML48Be9zGTVmZRJIRbvB:OsTH+VC9Jtd9VdCr7fMp/8yGTVmzmZ
                                                        MD5:9EA8098D31ADB0F9D928759BDCA39819
                                                        SHA1:E309C85C1C8E6CE049EEA1F39BEE654B9F98D7C5
                                                        SHA-256:3D9893AA79EFD13D81FCD614E9EF5FB6AAD90569BEEDED5112DE5ED5AC3CF753
                                                        SHA-512:86AF770F61C94DFBF074BCC4B11932BBA2511CAA83C223780112BDA4FFB7986270DC2649D4D3EA78614DBCE6F7468C8983A34966FC3F2DE53055AC6B5059A707
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........C..r...r...r......r...s...r...s...r...w...r...v..r...q...r.#.s...r...s...r..8z...r..8r...r..8....r..8p...r.Rich..r.........................PE..d...siAe.........." ...%.*..........0........................................ ............`.........................................p...d..........................................Px...............................w..@............@...............................text...X).......*.................. ..`.rdata...X...@...Z..................@..@.data...8=.......0..................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5162776
                                                        Entropy (8bit):5.958207976652471
                                                        Encrypted:false
                                                        SSDEEP:98304:S3+FRtLtlVriXpshX179Cahd4tC9P1+1CPwDvt3uFlDCi:ASRtLtvd99Cahd4tC9w1CPwDvt3uFlDz
                                                        MD5:51E8A5281C2092E45D8C97FBDBF39560
                                                        SHA1:C499C810ED83AAADCE3B267807E593EC6B121211
                                                        SHA-256:2A234B5AA20C3FAECF725BBB54FB33F3D94543F78FA7045408E905593E49960A
                                                        SHA-512:98B91719B0975CB38D3B3C7B6F820D184EF1B64D38AD8515BE0B8B07730E2272376B9E51631FE9EFD9B8A1709FEA214CF3F77B34EEB9FD282EB09E395120E7CB
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./',.kFB.kFB.kFB.b>..yFB..:C.iFB..:G.gFB..:F.cFB..:A.oFB.kFC..FB. >C.`FB.;A.KFB.;F..EB.;B.jFB.;..jFB.;@.jFB.RichkFB.........................PE..d...x..e.........." ...#..6..*......v.........................................O.......O...`.........................................0.G.0.....M.@....0N.|.....K.\.....N../...@N.....PsC.8............................qC.@.............M..............................text...4.6.......6................. ..`.rdata..`.....6.......6.............@..@.data....n....J..<....J.............@....pdata........K.......J.............@..@.idata...%....M..&....M.............@..@.00cfg..u.... N.......M.............@..@.rsrc...|....0N.......M.............@..@.reloc..k....@N.......M.............@..B................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):39696
                                                        Entropy (8bit):6.641880464695502
                                                        Encrypted:false
                                                        SSDEEP:768:NiQfxQemQJNrPN+moyijAc5YiSyvkIPxWEqG:dfxIQvPkmoyijP7SytPxF
                                                        MD5:0F8E4992CA92BAAF54CC0B43AACCCE21
                                                        SHA1:C7300975DF267B1D6ADCBAC0AC93FD7B1AB49BD2
                                                        SHA-256:EFF52743773EB550FCC6CE3EFC37C85724502233B6B002A35496D828BD7B280A
                                                        SHA-512:6E1B223462DC124279BFCA74FD2C66FE18B368FFBCA540C84E82E0F5BCBEA0E10CC243975574FA95ACE437B9D8B03A446ED5EE0C9B1B094147CEFAF704DFE978
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".H...(.......L...............................................n....`......................................... l.......p..P...............P....l.../......,...@d...............................c..@............`.. ............................text....G.......H.................. ..`.rdata..h....`.......L..............@..@.data................b..............@....pdata..P............d..............@..@.reloc..,............j..............@..B................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):790296
                                                        Entropy (8bit):5.607732992846443
                                                        Encrypted:false
                                                        SSDEEP:6144:7aO1lo7USZGjweMMHO4+xuVg7gCl2VdhMd1DdwMVn4TERUr3zgKpJJ/wknofFe9A:FkeMKOr97gCAE35gEGzLpwknofFe9XbE
                                                        MD5:BFC834BB2310DDF01BE9AD9CFF7C2A41
                                                        SHA1:FB1D601B4FCB29FF1B13B0D2ED7119BD0472205C
                                                        SHA-256:41AD1A04CA27A7959579E87FBBDA87C93099616A64A0E66260C983381C5570D1
                                                        SHA-512:6AF473C7C0997F2847EBE7CEE8EF67CD682DEE41720D4F268964330B449BA71398FDA8954524F9A97CC4CDF9893B8BDC7A1CF40E9E45A73F4F35A37F31C6A9C3
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........T..T..T..].3.Z....V......V....X....\....P....W..T..I....e....U.._.U....U..RichT..........PE..d......e.........." ...#.6..........K........................................0.......w....`..........................................w...Q..............s.... ..pM......./......`... ...8...............................@............................................text....4.......6.................. ..`.rdata...y...P...z...:..............@..@.data....N.......H..................@....pdata..XV... ...X..................@..@.idata..bc.......d...T..............@..@.00cfg..u...........................@..@.rsrc...s...........................@..@.reloc..?...........................@..B................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):27
                                                        Entropy (8bit):3.9265716511782736
                                                        Encrypted:false
                                                        SSDEEP:3:SZeW0FOoc:SZeRFHc
                                                        MD5:48734178084EF7F5C250997C28F8BDEE
                                                        SHA1:4D7BB7A1D9B08B32C6FFBAFCE440959D0BC19788
                                                        SHA-256:6D67B0F661E0332F0BA8CBBB46EA905C55CB071876091C747546D2C7EDF0138F
                                                        SHA-512:A227E9E2B7FC025767B4363544B4C4A675A123A853E68C740E659E662C354030F655B8FDA1D6CDF57B58CCA32A4757195F76D7A4A93048D334F047E7693F3335
                                                        Malicious:false
                                                        Preview:# Marker file for PEP 561..
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):8192
                                                        Entropy (8bit):5.097279386012455
                                                        Encrypted:false
                                                        SSDEEP:192:RC/PE+flkDFk4kVOAUAIXYP9laqCFd5zJ007:R4E65uYPVCFLzJ
                                                        MD5:0C5517AB8EDB22EA7A61E44B28E96DA7
                                                        SHA1:F902EE7E96CE48DE6404ADF644FA40E260D949FF
                                                        SHA-256:5C5942792BD8340CB8B27CD592F1015EDF56A8C5B26276EE18A482428E7C5726
                                                        SHA-512:F5B6D696A6B75BDEEACD0E0742D31EAA06CD683BB3C149052D82E0D47039534B23C82FC47FB193C86FF2B7C2B22F73CCC48CC500F09ABC5E228998D9BC413EF7
                                                        Malicious:false
                                                        Preview:....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):8192
                                                        Entropy (8bit):5.099678321615091
                                                        Encrypted:false
                                                        SSDEEP:192:UPmINi9ODjMzdZmIBI3C8+o95uECRdDGrRPY2+PDv:Ucfz7lqyHo9RCz2wLPDv
                                                        MD5:00D0909E346B52006D1E9EF680B5A5FC
                                                        SHA1:33E401BEA63F83A5EA84D78DDC7161809EF77F0B
                                                        SHA-256:417B26B3D8500A4AE3D59717D7011952DB6FC2FB84B807F3F94AC734E89C1B5F
                                                        SHA-512:1E2689A48317A12A6B4A6A74DE2241380FEF57B250FAFE6AB00A479DB85D12661F8C33749240C9CEC6535ACD7F91E71DCBA0BB8A27D1D32A3B76FE34797CAD5B
                                                        Malicious:false
                                                        Preview:....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):14945
                                                        Entropy (8bit):4.229683397391918
                                                        Encrypted:false
                                                        SSDEEP:384:6kfPbFvdXqyyLlY3fIVKj7KyvKxv/FjZ305yyRvQcR5bJw:lbrXqyyLS31/Kyviv/FaAyttR59w
                                                        MD5:38FD5E100D4604C2A844BB9BB9305975
                                                        SHA1:33A09B9BC987AAA8560FFEF8A17459C99C63ED4A
                                                        SHA-256:7E80E161C3E93D9554C2EFB78D4E3CEBF8FC727E9C52E03B83B94406BDCC95FC
                                                        SHA-512:3D56A9D507B5B07A99B9D9924D8540944DD226D4B5050852027F09309A85513DB2E57C9186F70B8F8226C342C28EFCEDD1E8EDD507E1D39F8DA693CFAC0C39CA
                                                        Malicious:false
                                                        Preview:abdikace.abeceda.adresa.agrese.akce.aktovka.alej.alkohol.amputace.ananas.andulka.anekdota.anketa.antika.anulovat.archa.arogance.asfalt.asistent.aspirace.astma.astronom.atlas.atletika.atol.autobus.azyl.babka.bachor.bacil.baculka.badatel.bageta.bagr.bahno.bakterie.balada.baletka.balkon.balonek.balvan.balza.bambus.bankomat.barbar.baret.barman.baroko.barva.baterka.batoh.bavlna.bazalka.bazilika.bazuka.bedna.beran.beseda.bestie.beton.bezinka.bezmoc.beztak.bicykl.bidlo.biftek.bikiny.bilance.biograf.biolog.bitva.bizon.blahobyt.blatouch.blecha.bledule.blesk.blikat.blizna.blokovat.bloudit.blud.bobek.bobr.bodlina.bodnout.bohatost.bojkot.bojovat.bokorys.bolest.borec.borovice.bota.boubel.bouchat.bouda.boule.bourat.boxer.bradavka.brambora.branka.bratr.brepta.briketa.brko.brloh.bronz.broskev.brunetka.brusinka.brzda.brzy.bublina.bubnovat.buchta.buditel.budka.budova.bufet.bujarost.bukvice.buldok.bulva.bunda.bunkr.burza.butik.buvol.buzola.bydlet.bylina.bytovka.bzukot.capart.carevna.cedr.cedule.cejch.cej
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):13116
                                                        Entropy (8bit):4.2192956006819475
                                                        Encrypted:false
                                                        SSDEEP:192:DAvLtKog3W8jiD1/oLpsExUKqlyjn6SybkSoxIFg/7mSX30hB8OnqdE5HpF2gS2:MvLAog/I1wdsExXxigaSUvRj5r
                                                        MD5:F23506956964FA69C98FA3FB5C8823B5
                                                        SHA1:B2D5241AE027A0E40F06A33D909809A190F210FE
                                                        SHA-256:2F5EED53A4727B4BF8880D8F3F199EFC90E58503646D9FF8EFF3A2ED3B24DBDA
                                                        SHA-512:416C71BA30018EA292BB36CDC23C9329673485A8D8933266A9D9A7CC72153B8BAED3D430F52EAB4F5D3ADDF6583611B3777A50454599F1E42716F5F879621123
                                                        Malicious:false
                                                        Preview:abandon.ability.able.about.above.absent.absorb.abstract.absurd.abuse.access.accident.account.accuse.achieve.acid.acoustic.acquire.across.act.action.actor.actress.actual.adapt.add.addict.address.adjust.admit.adult.advance.advice.aerobic.affair.afford.afraid.again.age.agent.agree.ahead.aim.air.airport.aisle.alarm.album.alcohol.alert.alien.all.alley.allow.almost.alone.alpha.already.also.alter.always.amateur.amazing.among.amount.amused.analyst.anchor.ancient.anger.angle.angry.animal.ankle.announce.annual.another.answer.antenna.antique.anxiety.any.apart.apology.appear.apple.approve.april.arch.arctic.area.arena.argue.arm.armed.armor.army.around.arrange.arrest.arrive.arrow.art.artefact.artist.artwork.ask.aspect.assault.asset.assist.assume.asthma.athlete.atom.attack.attend.attitude.attract.auction.audit.august.aunt.author.auto.autumn.average.avocado.avoid.awake.aware.away.awesome.awful.awkward.axis.baby.bachelor.bacon.badge.bag.balance.balcony.ball.bamboo.banana.banner.bar.barely.bargain.barre
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):16777
                                                        Entropy (8bit):4.213242727095934
                                                        Encrypted:false
                                                        SSDEEP:384:6J+AAri16KDuR4ckw3ezywsNB7CJEu4XjooTiOPMk8YTCm:6IAYi16muR4GezyhNB7r0HG8EP
                                                        MD5:F5905FD22FD0DEB0BE40F356204BA3FB
                                                        SHA1:BCD81ED81906BDAB57D9700A23413A7E22487D0E
                                                        SHA-256:EBC3959AB7801A1DF6BAC4FA7D970652F1DF76B683CD2F4003C941C63D517E59
                                                        SHA-512:001B2E7D1D17416776FA5306E4F7EC5812F3F35CC26FDE46800A7DAB1412870AC8B779B0C2FEC1D75C24B80868E55BC5BFB88C8DED50C84040248B76A2C5332D
                                                        Malicious:false
                                                        Preview:abaisser.abandon.abdiquer.abeille.abolir.aborder.aboutir.aboyer.abrasif.abreuver.abriter.abroger.abrupt.absence.absolu.absurde.abusif.abyssal.acade.mie.acajou.acarien.accabler.accepter.acclamer.accolade.accroche.accuser.acerbe.achat.acheter.aciduler.acier.acompte.acque.rir.acronyme.acteur.actif.actuel.adepte.ade.quat.adhe.sif.adjectif.adjuger.admettre.admirer.adopter.adorer.adoucir.adresse.adroit.adulte.adverbe.ae.rer.ae.ronef.affaire.affecter.affiche.affreux.affubler.agacer.agencer.agile.agiter.agrafer.agre.able.agrume.aider.aiguille.ailier.aimable.aisance.ajouter.ajuster.alarmer.alchimie.alerte.alge.bre.algue.alie.ner.aliment.alle.ger.alliage.allouer.allumer.alourdir.alpaga.altesse.alve.ole.amateur.ambigu.ambre.ame.nager.amertume.amidon.amiral.amorcer.amour.amovible.amphibie.ampleur.amusant.analyse.anaphore.anarchie.anatomie.ancien.ane.antir.angle.angoisse.anguleux.animal.annexer.annonce.annuel.anodin.anomalie.anonyme.anormal.antenne.antidote.anxieux.apaiser.ape.ritif.a
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):16033
                                                        Entropy (8bit):4.007887655086134
                                                        Encrypted:false
                                                        SSDEEP:384:7TRlelKQfV+XsNs6d6NN5Qd3kR72+ImtKlhT3sdHy1WVO0iiG:7TmBtP7dwN5Qpi4lG1VO0a
                                                        MD5:FBE635509A2859B7B6DE2C0F16F15ED8
                                                        SHA1:C6214EB1CEC7B1EE8CBA1F317AC612C51881448A
                                                        SHA-256:D392C49FDB700A24CD1FCEB237C1F65DCC128F6B34A8AACB58B59384B5C648C2
                                                        SHA-512:D3DCA24CF03F04EEA1872D98C91748A8AA7AEAC6E2C885A99F2D452904A75FFCF271506DB369335726C0E3F7C8A6454935782586414B9AFFD2FE0EB004223DA1
                                                        Malicious:false
                                                        Preview:abaco.abbaglio.abbinato.abete.abisso.abolire.abrasivo.abrogato.accadere.accenno.accusato.acetone.achille.acido.acqua.acre.acrilico.acrobata.acuto.adagio.addebito.addome.adeguato.aderire.adipe.adottare.adulare.affabile.affetto.affisso.affranto.aforisma.afoso.africano.agave.agente.agevole.aggancio.agire.agitare.agonismo.agricolo.agrumeto.aguzzo.alabarda.alato.albatro.alberato.albo.albume.alce.alcolico.alettone.alfa.algebra.aliante.alibi.alimento.allagato.allegro.allievo.allodola.allusivo.almeno.alogeno.alpaca.alpestre.altalena.alterno.alticcio.altrove.alunno.alveolo.alzare.amalgama.amanita.amarena.ambito.ambrato.ameba.america.ametista.amico.ammasso.ammenda.ammirare.ammonito.amore.ampio.ampliare.amuleto.anacardo.anagrafe.analista.anarchia.anatra.anca.ancella.ancora.andare.andrea.anello.angelo.angolare.angusto.anima.annegare.annidato.anno.annuncio.anonimo.anticipo.anzi.apatico.apertura.apode.apparire.appetito.appoggio.approdo.appunto.aprile.arabica.arachide.aragosta.araldica.arancio.aratur
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):26423
                                                        Entropy (8bit):3.554983747162495
                                                        Encrypted:false
                                                        SSDEEP:768:OwUkxkf27FkrH9tW/JgODfFFuHgFFqfw8QCBdqLMCl:Ogxkf27FkrdtW/JgOD9FuHgFFqfwLidW
                                                        MD5:C71FCA9FD3FE9F85514CB38A58859DE2
                                                        SHA1:A4EC1DA6C11A8C251195C7AD90817DDA6FE64488
                                                        SHA-256:2EED0AEF492291E061633D7AD8117F1A2B03EB80A29D0E4E3117AC2528D05FFD
                                                        SHA-512:3FAF87F7E48EB6635F7D7B18A34E7DACBC2C43A1CF6AA9C96015B2A3549710B8B7A0961E5D2E32D7E369099DB89A874C4D761A8384FB558744C7F47CA8CB0772
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):37832
                                                        Entropy (8bit):3.7380887691649907
                                                        Encrypted:false
                                                        SSDEEP:384:m57ktAhYlpH/gN8G3Ufyy7+Lp5vx5fBECMLJbnSTyKeeHjbnHeRigUuVyS+sOpVl:MSWhGES2O/r6
                                                        MD5:EC271D4926B82EF5C02AEFA7DD2DAAF4
                                                        SHA1:6C5C5F38E75673D1CEA20F2700468ADC163D869B
                                                        SHA-256:9E95F86C167DE88F450F0AAF89E87F6624A57F973C67B516E338E8E8B8897F60
                                                        SHA-512:E645A1E0F26F2727A8FB7605D3B59668A670C9DF04D07576FE473D844A23D0192020AEDC286FBB9B1F64709AD30E6ACB825803CF9F872954C1324AEFD4977710
                                                        Malicious:false
                                                        Preview:..................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):15671
                                                        Entropy (8bit):4.053540036444415
                                                        Encrypted:false
                                                        SSDEEP:384:XM3AG0Qk5DN0Wf3MmmzpjbdU5nTEHkYk0h3Vcf+VDG:c3AQMJ0Wf3HWby5QHkY9Vcf+tG
                                                        MD5:05EE6FDE129776830351BBACD5B0DCFB
                                                        SHA1:472727867B394A1C9168690C415B0094DC3A3383
                                                        SHA-256:2685E9C194C82AE67E10BA59D9EA5345A23DC093E92276FC5361F6667D79CD3F
                                                        SHA-512:0E6AA42870C6F9A77BDA0931EA9423FEBFFEFBEB49E9DBDA5FA732FC3479942629050517FEF57BB1A76026195E16785186C0CFE26261C8FCC31F52FE69BEDA0F
                                                        Malicious:false
                                                        Preview:abacate.abaixo.abalar.abater.abduzir.abelha.aberto.abismo.abotoar.abranger.abreviar.abrigar.abrupto.absinto.absoluto.absurdo.abutre.acabado.acalmar.acampar.acanhar.acaso.aceitar.acelerar.acenar.acervo.acessar.acetona.achatar.acidez.acima.acionado.acirrar.aclamar.aclive.acolhida.acomodar.acoplar.acordar.acumular.acusador.adaptar.adega.adentro.adepto.adequar.aderente.adesivo.adeus.adiante.aditivo.adjetivo.adjunto.admirar.adorar.adquirir.adubo.adverso.advogado.aeronave.afastar.aferir.afetivo.afinador.afivelar.aflito.afluente.afrontar.agachar.agarrar.agasalho.agenciar.agilizar.agiota.agitado.agora.agradar.agreste.agrupar.aguardar.agulha.ajoelhar.ajudar.ajustar.alameda.alarme.alastrar.alavanca.albergue.albino.alcatra.aldeia.alecrim.alegria.alertar.alface.alfinete.algum.alheio.aliar.alicate.alienar.alinhar.aliviar.almofada.alocar.alpiste.alterar.altitude.alucinar.alugar.aluno.alusivo.alvo.amaciar.amador.amarelo.amassar.ambas.ambiente.ameixa.amenizar.amido.amistoso.amizade.amolador.amontoar.a
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):26538
                                                        Entropy (8bit):3.827508989563015
                                                        Encrypted:false
                                                        SSDEEP:384:ou+5yukI02DpvaXhg8CnLOTsPsyOB7lanqA1p6tut/Mf2:H+5SIjDpvaXhrUSTsPsBBpand7xxMf2
                                                        MD5:8950901A308B43D263E31A377306D987
                                                        SHA1:7792B55B1838FAA8928C2528D304C2044ECD87BF
                                                        SHA-256:07F11AF3F07FD13D8D74859F4448D8BCA8F1D9D336DC4842531ECEA083103A26
                                                        SHA-512:5B747B7345E23F34DAFB35AFD9C2CB66AAD51456A7ACCBD9BF9CA7C285498A74C50647DA4D553AF763505935E1519F61204DB87D998B09583CC2585C91833B6B
                                                        Malicious:false
                                                        Preview:.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):13996
                                                        Entropy (8bit):4.187487403267613
                                                        Encrypted:false
                                                        SSDEEP:384:7SvbJ9E182qrUD0py4gnW6ji3Jl3ggHQqy8:s9ET1DsyXnne3xX
                                                        MD5:5171EE312F7709BEC7660BC9AC07351A
                                                        SHA1:B99205D24970E0ADA8E2182A1A68F1EB439C95A1
                                                        SHA-256:46846A5A0139D1E3CB77293E521C2865F7BCDB82C44E8D0A06A2CD0ECBA48C0B
                                                        SHA-512:0E838229265DE6C80505088682D2DC9510147C3AB1713B556B594D09529B493CC3A7E391AD690DDA2052D4E11C56572F8A215A7FFFDB2630B13B4637329F3C31
                                                        Malicious:false
                                                        Preview:a.baco.abdomen.abeja.abierto.abogado.abono.aborto.abrazo.abrir.abuelo.abuso.acabar.academia.acceso.accio.n.aceite.acelga.acento.aceptar.a.cido.aclarar.acne..acoger.acoso.activo.acto.actriz.actuar.acudir.acuerdo.acusar.adicto.admitir.adoptar.adorno.aduana.adulto.ae.reo.afectar.aficio.n.afinar.afirmar.a.gil.agitar.agoni.a.agosto.agotar.agregar.agrio.agua.agudo.a.guila.aguja.ahogo.ahorro.aire.aislar.ajedrez.ajeno.ajuste.alacra.n.alambre.alarma.alba.a.lbum.alcalde.aldea.alegre.alejar.alerta.aleta.alfiler.alga.algodo.n.aliado.aliento.alivio.alma.almeja.almi.bar.altar.alteza.altivo.alto.altura.alumno.alzar.amable.amante.amapola.amargo.amasar.a.mbar.a.mbito.ameno.amigo.amistad.amor.amparo.amplio.ancho.anciano.ancla.andar.ande.n.anemia.a.ngulo.anillo.a.nimo.ani.s.anotar.antena.antiguo.antojo.anual.anular.anuncio.an.adir.an.ejo.an.o.apagar.aparato.apetito.apio.aplicar.apodo.aporte.apoyo.aprender.aprobar.apuesta.apuro.arado.aran.a.arar.a.rbitro.a.rbol.arbusto.archivo.arc
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:Unicode text, UTF-8 text
                                                        Category:dropped
                                                        Size (bytes):15324
                                                        Entropy (8bit):4.562888468144625
                                                        Encrypted:false
                                                        SSDEEP:384:RyHE73AnXs3FzmzZIPXJBmqM0yHvnWMGRUIHF3N09GU:RWE7QnX6PPX7M0yPnvGHl3N0GU
                                                        MD5:BA9ADCC5210C101DF4B26871504F253D
                                                        SHA1:C0AEDCD8297FB58456C0A60854E04B547DFC9576
                                                        SHA-256:A7DC9C77913726106C7B8BAA022B7E17601D118ACF40AA60AB1FBC9C91B383AC
                                                        SHA-512:D16BADD39006E06FC5AD03AA7AA622ED19A19271E300061183BFA7A2F913919E8A0C831BC74FA3E6DEE1EC35AF01AC904D2617EC3EF7DFA3FADE6EBEF788E218
                                                        Malicious:false
                                                        Preview:abajur.abak.s.abart..abdal.abdest.abiye.abluka.abone.absorbe.abs.rt.acayip.acele.acemi.a..kg.z.adalet.adam.adezyon.adisyon.adliye.adres.afacan.afili.afi..afiyet.aforizm.afra.a.a..a..r.ahbap.ahkam.ahlak.ahtapot.aidat.aile.ajan.akademi.akarsu.akba..akci.er.akdeniz.ak.bet.ak.l.ak.nt..akide.akrep.akrobasi.aksiyon.ak.am.aktif.akt.r.aktris.akustik.alaca.alb.m.al.ak.aldanma.aleni.alet.alfabe.alg.lama.al.ngan.alk...alkol.alpay.alperen.alt.n.alt.st.altyap..alyuvar.amade.amat.r.amazon.ambalaj.amblem.ambulans.amca.amel.amigo.amir.amiyane.amorti.ampul.anadolu.anahtar.anakonda.anaokul.anapara.anar.i.anatomi.anayasa.anekdot.anestezi.angaje.anka.anket.anlaml..anne.anomali.anonim.anten.antla.ma.apse.araba.arac..araf.arbede.arda.arefe.arena.argo.arg.man.arkada..armoni.aroma.arsa.ars.z.art..artist.aruz.asans.r.asayi..asfalt.asgari.asil.asker.ask..aslan.asosyal.astsubay.asya.a....a..r..a.ure.atabey.ataman.ate..atmaca.atmosfer.atom.at.lye.avc..avdet.avize.
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):67072
                                                        Entropy (8bit):5.909510426434191
                                                        Encrypted:false
                                                        SSDEEP:1536:aJsHmR02IvVxv7WCyKm7c5Th4MBHTOvyyaZE:apIvryCyKx5Th4M5OvyyO
                                                        MD5:3E579844160DE8322D574501A0F91516
                                                        SHA1:C8DE193854F7FC94F103BD4AC726246981264508
                                                        SHA-256:95F01CE7E37F6B4B281DBC76E9B88F28A03CB02D41383CC986803275A1CD6333
                                                        SHA-512:EE2A026E8E70351D395329C78A07ACB1B9440261D2557F639E817A8149BA625173EF196AED3D1C986577D78DC1A7EC9FED759C19346C51511474FE6D235B1817
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......nT..*5..*5..*5..#M2. 5..x@..(5..x@..&5..x@.."5..x@...5...k..(5..aM..;5..*5...5...@..:5...@..+5...@^.+5...@..+5..Rich*5..................PE..d.....qf.........." .........h......\........................................@............`.........................................0...`.......@.... .......................0..(.......................................8............................................text...h........................... ..`.rdata..\I.......J..................@..@.data...x...........................@....pdata..............................@..@.rsrc........ ......................@..@.reloc..(....0......................@..B........................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):67352
                                                        Entropy (8bit):6.146958413069333
                                                        Encrypted:false
                                                        SSDEEP:768:Hw/EsYpkVgBaz57kcDA7QKFmpz7cnzH/ks/KF61xubwmB1Cf//yhC74JFmpktJSG:Q/5k8cnzeJlJIyL0T7Sydix3
                                                        MD5:FF319D24153238249ADEA18D8A3E54A7
                                                        SHA1:0474FAA64826A48821B7A82AD256525AA9C5315E
                                                        SHA-256:A462A21B5F0C05F0F7EC030C4FDE032A13B34A8576D661A8E66F9AD23767E991
                                                        SHA-512:0E63FE4D5568CD2C54304183A29C7469F769816F517CD2D5B197049AA966C310CC13A7790560EF2EDC36B9B6D99FF586698886F906E19645FAEB89B0E65ADFDD
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........T...5e..5e..5e..m..5e..e..5e.....5e..g..5e.Rich.5e.........PE..d....'ne.........." ...%............................................................r.....`.........................................`...P................................/..............T............................................................................rdata..............................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5785880
                                                        Entropy (8bit):6.090091140780886
                                                        Encrypted:false
                                                        SSDEEP:98304:0asy3088wAPo8yN4yl57G+160THIM1uFvvBnTfDyY:hsy3088wAPo8pyl57G81GrOY
                                                        MD5:86E0AD6BA8A9052D1729DB2C015DAF1C
                                                        SHA1:48112072903FFF2EC5726CCA19CC09E42D6384C7
                                                        SHA-256:5ECDA62F6FD2822355C560412F6D90BE46A7F763F0FFEEC9854177904632AC2D
                                                        SHA-512:5D6E32F9FF90A9A584183DAD1583AEA2327B4AEA32184B0EBBEC3DF41B0B833E6BB3CD40822DD64D1033125F52255812B17E4FA0ADD38FCDA6BAB1724DFAA2EB
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........b..|...|...|.......|.......|.......|.......|.......|.......|......|...|..}.......|.......|.......|.......|..Rich.|..........................PE..d....'ne.........." ...%..%..L7......u.......................................0].....*.X...`...........................................@.......A.......[.......W..2....X../....[.tD....*.T.............................*.@.............%..............................text....%.......%................. ..`.rdata........%.......%.............@..@.data... #....A..T....A.............@....pdata...2....W..4....R.............@..@PyRuntim.....@Y......>T.............@....rsrc.........[.......V.............@..@.reloc..tD....[..F....V.............@..B........................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):30488
                                                        Entropy (8bit):6.584716253229207
                                                        Encrypted:false
                                                        SSDEEP:384:aEeecReGLnUC0HqGn57AvB0NJIyQGdHQIYiSy1pCQUNIeAM+o/8E9VF0NylE3X:SeUeW4HqIG+JIyQGB5YiSyv2AMxkEg3X
                                                        MD5:0B55F18218F4C8F30105DB9F179AFB2C
                                                        SHA1:F1914831CF0A1AF678970824F1C4438CC05F5587
                                                        SHA-256:E7FE45BAEF9CEE192C65FCFCE1790CCB6F3F9B81E86DF82C08F838E86275AF02
                                                        SHA-512:428EE25E99F882AF5AD0DEDF1CCDBEB1B4022AC286AF23B209947A910BF02AE18A761F3152990C84397649702D8208FED269AA3E3A3C65770E21EE1EEC064CC1
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V..t.s.'.s.'.s.'..7'.s.'...&.s.'...&.s.'...&.s.'...&.s.'(.&.s.'.s.'Ps.'Y..&.s.'(.&.s.'(.&.s.'(.['.s.'(.&.s.'Rich.s.'........PE..d....'ne.........." ...%.....2.......................................................-....`..........................................@..L...,A..x....p.......`.......H.../......L....3..T............................2..@............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......6..............@....pdata.......`.......8..............@..@.rsrc........p.......<..............@..@.reloc..L............F..............@..B................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1141016
                                                        Entropy (8bit):5.435101785627634
                                                        Encrypted:false
                                                        SSDEEP:12288:3YPYbfjwR6nbkonRiPDjRrO5184EPYPx++ZiLKGZ5KXyVH4eDqLo:3aYbMR0IDJcjEwPgPOG6Xyd46qLo
                                                        MD5:D4323AC0BAAB59AED34C761F056D50A9
                                                        SHA1:843687689D21EDE9818C6FC5F3772BCF914F8A6E
                                                        SHA-256:71D27537EB1E6DE76FD145DA4FDCBC379DC54DE7854C99B2E61AAE00109C13D0
                                                        SHA-512:E31D071CE920B3E83C89505DFA22B2D0F09D43C408FCADBC910F021481C4A53C47919FCE0215AE61F00956DCB7171449EABDA8EEF63A6FDD47AA13C7158577BE
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........L..L..L..E.q.J..Y..N..Y..A..Y..D..Y..O..vE.O.....N..L.....vE.M..vE.M..vE..M..vE..M..RichL..........................PE..d....'ne.........." ...%.@..........P*....................................................`.............................................X............`.......P..0....:.../...p.......]..T............................[..@............P..x............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data...H....0......................@....pdata..0....P.......&..............@..@.rsrc........`......................@..@.reloc.......p.......8..............@..B................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe
                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5536256
                                                        Entropy (8bit):6.689058470432344
                                                        Encrypted:false
                                                        SSDEEP:98304:VJuCqT8q5Jt3eM2UIDLeIY3I7LMHrPZF6OhgIDxDjP5ysRAwRCVYFufw6:zulp5JtBF6Oh3DxxysRFkRw6
                                                        MD5:8FA2F1BA9B9A7EA2B3C4DD627C627CEC
                                                        SHA1:358E3800286E5D4C5662366AD7311BC5A51BA497
                                                        SHA-256:78A452A6E1A3951DC367F57ACE90711202C824B68835C5DB86814F5B41486947
                                                        SHA-512:74EDD438B806E086A3FACBE8FB98E235068C0D3F8572C6A3A937649CA0E9A6BCB9F0B42E5562E1CBE3576B011AB83730FC622B1496CC448DD3C296284671E775
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, Author: Joe Security
                                                        • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, Author: unknown
                                                        • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, Author: Florian Roth
                                                        • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Users\user\AppData\Local\Temp\uyfkrbdwixpr.tmp, Author: ditekSHen
                                                        Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$................................................................i..............C..Q....i.....i.....i........}....i.....Rich...........PE..d.....(d..........".......9...D.......6........@..............................~...........`.................................................|.P......P~.......{..............`~......AM......................BM.(... AM.8.............9..............................text...^.9.......9................. ..`.rdata........9.......9.............@..@.data.....+...P.......P.............@....pdata........{.......Q.............@..@_RANDOMXV.....}.......S.............@..`_TEXT_CN.&....}..(....S.............@..`_TEXT_CN..... ~.......S.............@..`_RDATA.......@~.......S.............@..@.rsrc........P~.......S.............@..@.reloc.......`~.......S.............@..B........................................
                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe
                                                        File Type:PE32+ executable (native) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):14544
                                                        Entropy (8bit):6.2660301556221185
                                                        Encrypted:false
                                                        SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                        MD5:0C0195C48B6B8582FA6F6373032118DA
                                                        SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                        SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                        SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):12945034
                                                        Entropy (8bit):7.987991966548952
                                                        Encrypted:false
                                                        SSDEEP:393216:szuRUAwf7vLF4NkW+eGQR6n/ikWMWfogBIv:szuRIx1W+e5R4qPDXe
                                                        MD5:F468AE483026819D6977E2A5E34EA52A
                                                        SHA1:BDCD08269C84863EACE14DC54D64C6F0AF41F332
                                                        SHA-256:578778FA4D79588A14D0830D4E52DC55AEAD1CA8BF99C9672CBDAF6C7B58EB5C
                                                        SHA-512:EA2056F8D41CE4DB455F9CACC7AC91919A8B35BB351BAFC08F5DF9F076B45369917DC06DFC944A83DC3AA99F535A680644F5EA97CFC4EB8DBBCCCE83D24590BD
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc...[hc..`.Qhc..g.Ihc..f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d....7.f.........."....(.......................@..........................................`.................................................l...x........+...`..."..............h.......................................@...............P............................text............................... ..`.rdata..B&.......(..................@..@.data....s..........................@....pdata..."...`...$..................@..@.rsrc....+.......,..................@..@.reloc..h...........................@..B........................................................................................................................................................................................................................................................
                                                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                        Entropy (8bit):7.987991966548952
                                                        TrID:
                                                        • Win64 Executable GUI (202006/5) 92.65%
                                                        • Win64 Executable (generic) (12005/4) 5.51%
                                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                                        • DOS Executable Generic (2002/1) 0.92%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:Q3pEXxmWAD.exe
                                                        File size:12'945'034 bytes
                                                        MD5:f468ae483026819d6977e2a5e34ea52a
                                                        SHA1:bdcd08269c84863eace14dc54d64c6f0af41f332
                                                        SHA256:578778fa4d79588a14d0830d4e52dc55aead1ca8bf99c9672cbdaf6c7b58eb5c
                                                        SHA512:ea2056f8d41ce4db455f9cacc7ac91919a8b35bb351bafc08f5df9f076b45369917dc06dfc944a83dc3aa99f535a680644f5ea97cfc4eb8dbbccce83d24590bd
                                                        SSDEEP:393216:szuRUAwf7vLF4NkW+eGQR6n/ikWMWfogBIv:szuRIx1W+e5R4qPDXe
                                                        TLSH:28D6338693E49DF2FCBA523C96854069E2B1742003F4C98F9BBD81A61F533E15E3FA51
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc.....[hc...`.Qhc...g.Ihc...f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d..
                                                        Icon Hash:0e9313214080a157
                                                        Entrypoint:0x14000c0d0
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x140000000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66A037E4 [Tue Jul 23 23:08:20 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:6
                                                        OS Version Minor:0
                                                        File Version Major:6
                                                        File Version Minor:0
                                                        Subsystem Version Major:6
                                                        Subsystem Version Minor:0
                                                        Import Hash:456e8615ad4320c9f54e50319a19df9c
                                                        Instruction
                                                        dec eax
                                                        sub esp, 28h
                                                        call 00007F251C95CE4Ch
                                                        dec eax
                                                        add esp, 28h
                                                        jmp 00007F251C95CA6Fh
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        dec eax
                                                        sub esp, 28h
                                                        call 00007F251C95D218h
                                                        test eax, eax
                                                        je 00007F251C95CC13h
                                                        dec eax
                                                        mov eax, dword ptr [00000030h]
                                                        dec eax
                                                        mov ecx, dword ptr [eax+08h]
                                                        jmp 00007F251C95CBF7h
                                                        dec eax
                                                        cmp ecx, eax
                                                        je 00007F251C95CC06h
                                                        xor eax, eax
                                                        dec eax
                                                        cmpxchg dword ptr [0003843Ch], ecx
                                                        jne 00007F251C95CBE0h
                                                        xor al, al
                                                        dec eax
                                                        add esp, 28h
                                                        ret
                                                        mov al, 01h
                                                        jmp 00007F251C95CBE9h
                                                        int3
                                                        int3
                                                        int3
                                                        dec eax
                                                        sub esp, 28h
                                                        test ecx, ecx
                                                        jne 00007F251C95CBF9h
                                                        mov byte ptr [00038425h], 00000001h
                                                        call 00007F251C95C345h
                                                        call 00007F251C95D630h
                                                        test al, al
                                                        jne 00007F251C95CBF6h
                                                        xor al, al
                                                        jmp 00007F251C95CC06h
                                                        call 00007F251C96A13Fh
                                                        test al, al
                                                        jne 00007F251C95CBFBh
                                                        xor ecx, ecx
                                                        call 00007F251C95D640h
                                                        jmp 00007F251C95CBDCh
                                                        mov al, 01h
                                                        dec eax
                                                        add esp, 28h
                                                        ret
                                                        int3
                                                        int3
                                                        inc eax
                                                        push ebx
                                                        dec eax
                                                        sub esp, 20h
                                                        cmp byte ptr [000383ECh], 00000000h
                                                        mov ebx, ecx
                                                        jne 00007F251C95CC59h
                                                        cmp ecx, 01h
                                                        jnbe 00007F251C95CC5Ch
                                                        call 00007F251C95D18Eh
                                                        test eax, eax
                                                        je 00007F251C95CC1Ah
                                                        test ebx, ebx
                                                        jne 00007F251C95CC16h
                                                        dec eax
                                                        lea ecx, dword ptr [000383D6h]
                                                        call 00007F251C969F32h
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x3c76c0x78.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000x2bb4.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x460000x2208.pdata
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4c0000x768.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x39dc00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39c800x140.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x450.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x292100x29400aca64598002ecff9eefbc96554edf015False0.5511067708333334data6.4784482217419175IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x2b0000x126420x1280048bdefaa3a3979f85de906447e67a69fFalse0.5245460304054054data5.750853782659358IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0x3e0000x73d80xe00d0a288978c66419b180b35f625b6dce7False0.13532366071428573data1.8378139998458343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .pdata0x460000x22080x240074cf3ea22e0a1756984435d6f80f7da5False0.4671223958333333data5.259201915045256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .rsrc0x490000x2bb40x2c00e29fd86a5b73bf6fb312f4fd0e85b0b6False0.13893821022727273data2.837433433937152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x4c0000x7680x80071de9271648326ec88350e903470cf3eFalse0.5576171875data5.283119454571673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x490e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.08143153526970955
                                                        RT_GROUP_ICON0x4b6900x14data1.15
                                                        RT_MANIFEST0x4b6a40x50dXML 1.0 document, ASCII text0.4694508894044857
                                                        DLLImport
                                                        USER32.dllCreateWindowExW, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                                        COMCTL32.dll
                                                        KERNEL32.dllGetACP, IsValidCodePage, GetStringTypeW, GetFileAttributesExW, SetEnvironmentVariableW, FlushFileBuffers, GetCurrentDirectoryW, GetOEMCP, GetCPInfo, GetModuleHandleW, MulDiv, GetLastError, FormatMessageW, GetModuleFileNameW, SetDllDirectoryW, CreateSymbolicLinkW, GetProcAddress, CreateDirectoryW, GetCommandLineW, GetEnvironmentVariableW, ExpandEnvironmentStringsW, GetEnvironmentStringsW, FindClose, FindFirstFileW, FindNextFileW, GetDriveTypeW, RemoveDirectoryW, GetTempPathW, CloseHandle, WaitForSingleObject, Sleep, GetCurrentProcess, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, LocalFree, SetConsoleCtrlHandler, K32EnumProcessModules, K32GetModuleFileNameExW, CreateFileW, FindFirstFileExW, GetFinalPathNameByHandleW, MultiByteToWideChar, WideCharToMultiByte, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, IsProcessorFeaturePresent, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, ReadFile, GetFullPathNameW, SetStdHandle, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                                        ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                                        GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                        2024-07-24T10:58:06.272680+0200UDP2047928ET MALWARE CoinMiner Domain in DNS Lookup (pool .supportxmr .com)5567853192.168.2.51.1.1.1
                                                        2024-07-24T10:57:57.586154+0200TCP2826930ETPRO COINMINER XMR CoinMiner Usage497053333192.168.2.5141.94.96.195
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jul 24, 2024 10:58:06.284548998 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:06.289634943 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:06.289731026 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:06.289949894 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:06.294751883 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:06.921200037 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:06.976597071 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:12.683777094 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:12.684612036 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:12.684792042 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:19.532948971 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:19.756608963 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:19.756670952 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:26.747989893 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:26.945508957 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:29.724639893 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:29.961143970 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:39.981369972 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:40.054764986 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:58:50.242831945 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:58:50.461102962 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:59:00.500911951 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:59:00.648510933 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:59:10.619055986 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:59:10.757894993 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:59:20.661617041 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:59:20.757911921 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:59:26.805582047 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:59:26.961030006 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:59:35.373286009 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:59:35.422254086 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:59:45.626724005 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:59:45.758022070 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 10:59:55.627650976 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 10:59:55.757946014 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 11:00:03.001919985 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 11:00:03.148566961 CEST497053333192.168.2.5141.94.96.195
                                                        Jul 24, 2024 11:00:08.053011894 CEST333349705141.94.96.195192.168.2.5
                                                        Jul 24, 2024 11:00:08.101684093 CEST497053333192.168.2.5141.94.96.195
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jul 24, 2024 10:58:06.272680044 CEST5567853192.168.2.51.1.1.1
                                                        Jul 24, 2024 10:58:06.280405998 CEST53556781.1.1.1192.168.2.5
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jul 24, 2024 10:58:06.272680044 CEST192.168.2.51.1.1.10x64eeStandard query (0)pool.supportxmr.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jul 24, 2024 10:58:06.280405998 CEST1.1.1.1192.168.2.50x64eeNo error (0)pool.supportxmr.compool-fr.supportxmr.comCNAME (Canonical name)IN (0x0001)false
                                                        Jul 24, 2024 10:58:06.280405998 CEST1.1.1.1192.168.2.50x64eeNo error (0)pool-fr.supportxmr.com141.94.96.195A (IP address)IN (0x0001)false
                                                        Jul 24, 2024 10:58:06.280405998 CEST1.1.1.1192.168.2.50x64eeNo error (0)pool-fr.supportxmr.com141.94.96.144A (IP address)IN (0x0001)false
                                                        Jul 24, 2024 10:58:06.280405998 CEST1.1.1.1192.168.2.50x64eeNo error (0)pool-fr.supportxmr.com141.94.96.71A (IP address)IN (0x0001)false
                                                        Jul 24, 2024 10:58:18.401381969 CEST1.1.1.1192.168.2.50x9553No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                        Jul 24, 2024 10:58:18.401381969 CEST1.1.1.1192.168.2.50x9553No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:04:57:58
                                                        Start date:24/07/2024
                                                        Path:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\Q3pEXxmWAD.exe"
                                                        Imagebase:0x7ff615a20000
                                                        File size:12'945'034 bytes
                                                        MD5 hash:F468AE483026819D6977E2A5E34EA52A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:2
                                                        Start time:04:58:00
                                                        Start date:24/07/2024
                                                        Path:C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\Q3pEXxmWAD.exe"
                                                        Imagebase:0x7ff615a20000
                                                        File size:12'945'034 bytes
                                                        MD5 hash:F468AE483026819D6977E2A5E34EA52A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:3
                                                        Start time:04:58:03
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe
                                                        Imagebase:0x7ff627cb0000
                                                        File size:289'792 bytes
                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:04:58:03
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:04:58:03
                                                        Start date:24/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Users\user\AppData\Local\Temp\_MEI50042\Blsvr.exe
                                                        Imagebase:0x7ff758a60000
                                                        File size:5'701'632 bytes
                                                        MD5 hash:4781C53D9BB1CB237B653C687028203D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmp, Author: Joe Security
                                                        • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000005.00000002.2072346669.00007FF758A7B000.00000004.00000001.01000000.00000016.sdmp, Author: unknown
                                                        Antivirus matches:
                                                        • Detection: 79%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                        Imagebase:0x7ff627cb0000
                                                        File size:289'792 bytes
                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop UsoSvc
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop WaaSMedicSvc
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop wuauserv
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop bits
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:12
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop dosvc
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:13
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:289'792 bytes
                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:14
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:15
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\powercfg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:powercfg /x -hibernate-timeout-ac 0
                                                        Imagebase:0x7ff65ad60000
                                                        File size:96'256 bytes
                                                        MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:16
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\powercfg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:powercfg /x -hibernate-timeout-dc 0
                                                        Imagebase:0x7ff65ad60000
                                                        File size:96'256 bytes
                                                        MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\conhost.exe
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000011.00000002.3255036623.000001F6A91A6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000011.00000002.3255036623.000001F6A91C1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        Has exited:false

                                                        Target ID:18
                                                        Start time:04:58:04
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\powercfg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:powercfg /x -standby-timeout-ac 0
                                                        Imagebase:0x7ff65ad60000
                                                        File size:96'256 bytes
                                                        MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:19
                                                        Start time:04:58:05
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\powercfg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:powercfg /x -standby-timeout-dc 0
                                                        Imagebase:0x7ff65ad60000
                                                        File size:96'256 bytes
                                                        MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:20
                                                        Start time:04:58:13
                                                        Start date:24/07/2024
                                                        Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe"
                                                        Imagebase:0x7ff66d430000
                                                        File size:12'945'034 bytes
                                                        MD5 hash:F468AE483026819D6977E2A5E34EA52A
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Target ID:21
                                                        Start time:04:58:15
                                                        Start date:24/07/2024
                                                        Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Q3pEXxmWAD.exe"
                                                        Imagebase:0x7ff66d430000
                                                        File size:12'945'034 bytes
                                                        MD5 hash:F468AE483026819D6977E2A5E34EA52A
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Target ID:23
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe
                                                        Imagebase:0x7ff627cb0000
                                                        File size:289'792 bytes
                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:24
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:25
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Users\user\AppData\Local\Temp\_MEI63882\Blsvr.exe
                                                        Imagebase:0x7ff667860000
                                                        File size:5'701'632 bytes
                                                        MD5 hash:4781C53D9BB1CB237B653C687028203D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000019.00000002.2223523433.00007FF66787B000.00000004.00000001.01000000.0000002C.sdmp, Author: Joe Security
                                                        • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000019.00000002.2223523433.00007FF66787B000.00000004.00000001.01000000.0000002C.sdmp, Author: unknown
                                                        Antivirus matches:
                                                        • Detection: 79%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:26
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                        Imagebase:0x7ff627cb0000
                                                        File size:289'792 bytes
                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:27
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:28
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop UsoSvc
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:29
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop WaaSMedicSvc
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:30
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop wuauserv
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:31
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop bits
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:32
                                                        Start time:04:58:19
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\sc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:sc stop dosvc
                                                        Imagebase:0x7ff7cd0f0000
                                                        File size:72'192 bytes
                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:33
                                                        Start time:04:58:20
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                        Imagebase:0x7ff627cb0000
                                                        File size:289'792 bytes
                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:34
                                                        Start time:04:58:20
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:35
                                                        Start time:04:58:20
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\powercfg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:powercfg /x -hibernate-timeout-ac 0
                                                        Imagebase:0x7ff65ad60000
                                                        File size:96'256 bytes
                                                        MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:36
                                                        Start time:04:58:20
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\powercfg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:powercfg /x -hibernate-timeout-dc 0
                                                        Imagebase:0x7ff65ad60000
                                                        File size:96'256 bytes
                                                        MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:37
                                                        Start time:04:58:21
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\powercfg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:powercfg /x -standby-timeout-ac 0
                                                        Imagebase:0x7ff65ad60000
                                                        File size:96'256 bytes
                                                        MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:38
                                                        Start time:04:58:21
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\powercfg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:powercfg /x -standby-timeout-dc 0
                                                        Imagebase:0x7ff65ad60000
                                                        File size:96'256 bytes
                                                        MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:40
                                                        Start time:04:58:45
                                                        Start date:24/07/2024
                                                        Path:C:\Windows\System32\svchost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                        Imagebase:0x7ff7e52b0000
                                                        File size:55'320 bytes
                                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:8.8%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:19.1%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:33
                                                          execution_graph 19544 7ff615a2be70 19545 7ff615a2be80 19544->19545 19561 7ff615a38ec0 19545->19561 19547 7ff615a2be8c 19567 7ff615a2c168 19547->19567 19549 7ff615a2c44c 7 API calls 19551 7ff615a2bf25 19549->19551 19550 7ff615a2bea4 _RTC_Initialize 19559 7ff615a2bef9 19550->19559 19572 7ff615a2c318 19550->19572 19553 7ff615a2beb9 19575 7ff615a3832c 19553->19575 19559->19549 19560 7ff615a2bf15 19559->19560 19562 7ff615a38ed1 19561->19562 19563 7ff615a38ed9 19562->19563 19564 7ff615a343f4 _set_fmode 11 API calls 19562->19564 19563->19547 19565 7ff615a38ee8 19564->19565 19566 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 19565->19566 19566->19563 19568 7ff615a2c179 19567->19568 19571 7ff615a2c17e __scrt_release_startup_lock 19567->19571 19569 7ff615a2c44c 7 API calls 19568->19569 19568->19571 19570 7ff615a2c1f2 19569->19570 19571->19550 19600 7ff615a2c2dc 19572->19600 19574 7ff615a2c321 19574->19553 19576 7ff615a3834c 19575->19576 19577 7ff615a2bec5 19575->19577 19578 7ff615a3836a GetModuleFileNameW 19576->19578 19579 7ff615a38354 19576->19579 19577->19559 19599 7ff615a2c3ec InitializeSListHead 19577->19599 19583 7ff615a38395 19578->19583 19580 7ff615a343f4 _set_fmode 11 API calls 19579->19580 19581 7ff615a38359 19580->19581 19582 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 19581->19582 19582->19577 19615 7ff615a382cc 19583->19615 19586 7ff615a383dd 19587 7ff615a343f4 _set_fmode 11 API calls 19586->19587 19588 7ff615a383e2 19587->19588 19589 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19588->19589 19589->19577 19590 7ff615a38417 19592 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19590->19592 19591 7ff615a383f5 19591->19590 19593 7ff615a3845c 19591->19593 19594 7ff615a38443 19591->19594 19592->19577 19597 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19593->19597 19595 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19594->19595 19596 7ff615a3844c 19595->19596 19598 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19596->19598 19597->19590 19598->19577 19601 7ff615a2c2f6 19600->19601 19603 7ff615a2c2ef 19600->19603 19604 7ff615a394fc 19601->19604 19603->19574 19607 7ff615a39138 19604->19607 19614 7ff615a3f5e8 EnterCriticalSection 19607->19614 19616 7ff615a382e4 19615->19616 19620 7ff615a3831c 19615->19620 19617 7ff615a3dea8 _set_fmode 11 API calls 19616->19617 19616->19620 19618 7ff615a38312 19617->19618 19619 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19618->19619 19619->19620 19620->19586 19620->19591 18551 7ff615a49ef3 18552 7ff615a49f03 18551->18552 18555 7ff615a34788 LeaveCriticalSection 18552->18555 18556 7ff615a3fbd8 18557 7ff615a3fbfc 18556->18557 18560 7ff615a3fc0c 18556->18560 18558 7ff615a343f4 _set_fmode 11 API calls 18557->18558 18578 7ff615a3fc01 18558->18578 18559 7ff615a3feec 18562 7ff615a343f4 _set_fmode 11 API calls 18559->18562 18560->18559 18561 7ff615a3fc2e 18560->18561 18563 7ff615a3fc4f 18561->18563 18687 7ff615a40294 18561->18687 18564 7ff615a3fef1 18562->18564 18567 7ff615a3fcc1 18563->18567 18569 7ff615a3fc75 18563->18569 18574 7ff615a3fcb5 18563->18574 18566 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18564->18566 18566->18578 18571 7ff615a3dea8 _set_fmode 11 API calls 18567->18571 18588 7ff615a3fc84 18567->18588 18568 7ff615a3fd6e 18577 7ff615a3fd8b 18568->18577 18585 7ff615a3fddd 18568->18585 18702 7ff615a389d8 18569->18702 18575 7ff615a3fcd7 18571->18575 18573 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18573->18578 18574->18568 18574->18588 18708 7ff615a4643c 18574->18708 18579 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18575->18579 18582 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18577->18582 18583 7ff615a3fce5 18579->18583 18580 7ff615a3fc9d 18580->18574 18587 7ff615a40294 45 API calls 18580->18587 18581 7ff615a3fc7f 18584 7ff615a343f4 _set_fmode 11 API calls 18581->18584 18586 7ff615a3fd94 18582->18586 18583->18574 18583->18588 18591 7ff615a3dea8 _set_fmode 11 API calls 18583->18591 18584->18588 18585->18588 18589 7ff615a426ec 40 API calls 18585->18589 18597 7ff615a3fd99 18586->18597 18744 7ff615a426ec 18586->18744 18587->18574 18588->18573 18590 7ff615a3fe1a 18589->18590 18592 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18590->18592 18594 7ff615a3fd07 18591->18594 18596 7ff615a3fe24 18592->18596 18595 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18594->18595 18595->18574 18596->18588 18596->18597 18598 7ff615a3fee0 18597->18598 18602 7ff615a3dea8 _set_fmode 11 API calls 18597->18602 18600 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18598->18600 18599 7ff615a3fdc5 18601 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18599->18601 18600->18578 18601->18597 18603 7ff615a3fe68 18602->18603 18604 7ff615a3fe79 18603->18604 18605 7ff615a3fe70 18603->18605 18606 7ff615a397b4 __std_exception_copy 37 API calls 18604->18606 18607 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18605->18607 18608 7ff615a3fe88 18606->18608 18609 7ff615a3fe77 18607->18609 18610 7ff615a3ff1b 18608->18610 18611 7ff615a3fe90 18608->18611 18614 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18609->18614 18613 7ff615a39c10 _isindst 17 API calls 18610->18613 18753 7ff615a46554 18611->18753 18616 7ff615a3ff2f 18613->18616 18614->18578 18619 7ff615a3ff58 18616->18619 18626 7ff615a3ff68 18616->18626 18617 7ff615a3fed8 18622 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18617->18622 18618 7ff615a3feb7 18620 7ff615a343f4 _set_fmode 11 API calls 18618->18620 18621 7ff615a343f4 _set_fmode 11 API calls 18619->18621 18623 7ff615a3febc 18620->18623 18624 7ff615a3ff5d 18621->18624 18622->18598 18627 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18623->18627 18625 7ff615a4024b 18629 7ff615a343f4 _set_fmode 11 API calls 18625->18629 18626->18625 18628 7ff615a3ff8a 18626->18628 18627->18609 18630 7ff615a3ffa7 18628->18630 18772 7ff615a4037c 18628->18772 18631 7ff615a40250 18629->18631 18634 7ff615a4001b 18630->18634 18636 7ff615a3ffcf 18630->18636 18642 7ff615a4000f 18630->18642 18633 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18631->18633 18633->18624 18638 7ff615a40043 18634->18638 18643 7ff615a3dea8 _set_fmode 11 API calls 18634->18643 18657 7ff615a3ffde 18634->18657 18635 7ff615a400ce 18645 7ff615a400eb 18635->18645 18654 7ff615a4013e 18635->18654 18787 7ff615a38a14 18636->18787 18640 7ff615a3dea8 _set_fmode 11 API calls 18638->18640 18638->18642 18638->18657 18646 7ff615a40065 18640->18646 18641 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18641->18624 18642->18635 18642->18657 18793 7ff615a462fc 18642->18793 18647 7ff615a40035 18643->18647 18650 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18645->18650 18651 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18646->18651 18652 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18647->18652 18648 7ff615a3ffd9 18653 7ff615a343f4 _set_fmode 11 API calls 18648->18653 18649 7ff615a3fff7 18649->18642 18656 7ff615a4037c 45 API calls 18649->18656 18655 7ff615a400f4 18650->18655 18651->18642 18652->18638 18653->18657 18654->18657 18658 7ff615a426ec 40 API calls 18654->18658 18661 7ff615a426ec 40 API calls 18655->18661 18663 7ff615a400fa 18655->18663 18656->18642 18657->18641 18659 7ff615a4017c 18658->18659 18660 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18659->18660 18662 7ff615a40186 18660->18662 18665 7ff615a40126 18661->18665 18662->18657 18662->18663 18664 7ff615a4023f 18663->18664 18668 7ff615a3dea8 _set_fmode 11 API calls 18663->18668 18666 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18664->18666 18667 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18665->18667 18666->18624 18667->18663 18669 7ff615a401cb 18668->18669 18670 7ff615a401dc 18669->18670 18671 7ff615a401d3 18669->18671 18673 7ff615a3f784 37 API calls 18670->18673 18672 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18671->18672 18675 7ff615a401da 18672->18675 18674 7ff615a401ea 18673->18674 18676 7ff615a4027f 18674->18676 18677 7ff615a401f2 SetEnvironmentVariableW 18674->18677 18681 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18675->18681 18680 7ff615a39c10 _isindst 17 API calls 18676->18680 18678 7ff615a40237 18677->18678 18679 7ff615a40216 18677->18679 18684 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18678->18684 18682 7ff615a343f4 _set_fmode 11 API calls 18679->18682 18683 7ff615a40293 18680->18683 18681->18624 18685 7ff615a4021b 18682->18685 18684->18664 18686 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18685->18686 18686->18675 18688 7ff615a402c9 18687->18688 18694 7ff615a402b1 18687->18694 18689 7ff615a3dea8 _set_fmode 11 API calls 18688->18689 18697 7ff615a402ed 18689->18697 18690 7ff615a4034e 18693 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18690->18693 18691 7ff615a39814 __CxxCallCatchBlock 45 API calls 18692 7ff615a40378 18691->18692 18693->18694 18694->18563 18695 7ff615a3dea8 _set_fmode 11 API calls 18695->18697 18696 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18696->18697 18697->18690 18697->18695 18697->18696 18698 7ff615a397b4 __std_exception_copy 37 API calls 18697->18698 18699 7ff615a4035d 18697->18699 18701 7ff615a40372 18697->18701 18698->18697 18700 7ff615a39c10 _isindst 17 API calls 18699->18700 18700->18701 18701->18691 18703 7ff615a389e8 18702->18703 18704 7ff615a389f1 18702->18704 18703->18704 18817 7ff615a384b0 18703->18817 18704->18580 18704->18581 18709 7ff615a46449 18708->18709 18710 7ff615a45564 18708->18710 18712 7ff615a34178 45 API calls 18709->18712 18711 7ff615a45571 18710->18711 18716 7ff615a455a7 18710->18716 18713 7ff615a343f4 _set_fmode 11 API calls 18711->18713 18732 7ff615a45518 18711->18732 18715 7ff615a4647d 18712->18715 18717 7ff615a4557b 18713->18717 18714 7ff615a455d1 18718 7ff615a343f4 _set_fmode 11 API calls 18714->18718 18719 7ff615a46482 18715->18719 18720 7ff615a46493 18715->18720 18724 7ff615a464aa 18715->18724 18716->18714 18721 7ff615a455f6 18716->18721 18722 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18717->18722 18723 7ff615a455d6 18718->18723 18719->18574 18725 7ff615a343f4 _set_fmode 11 API calls 18720->18725 18729 7ff615a34178 45 API calls 18721->18729 18734 7ff615a455e1 18721->18734 18726 7ff615a45586 18722->18726 18727 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18723->18727 18730 7ff615a464c6 18724->18730 18731 7ff615a464b4 18724->18731 18728 7ff615a46498 18725->18728 18726->18574 18727->18734 18733 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18728->18733 18729->18734 18736 7ff615a464d7 18730->18736 18737 7ff615a464ee 18730->18737 18735 7ff615a343f4 _set_fmode 11 API calls 18731->18735 18732->18574 18733->18719 18734->18574 18739 7ff615a464b9 18735->18739 19049 7ff615a455b4 18736->19049 19058 7ff615a4825c 18737->19058 18742 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18739->18742 18742->18719 18743 7ff615a343f4 _set_fmode 11 API calls 18743->18719 18745 7ff615a4272b 18744->18745 18746 7ff615a4270e 18744->18746 18748 7ff615a42735 18745->18748 19098 7ff615a46f48 18745->19098 18746->18745 18747 7ff615a4271c 18746->18747 18749 7ff615a343f4 _set_fmode 11 API calls 18747->18749 19105 7ff615a46f84 18748->19105 18752 7ff615a42721 memcpy_s 18749->18752 18752->18599 18754 7ff615a34178 45 API calls 18753->18754 18755 7ff615a465ba 18754->18755 18756 7ff615a465c8 18755->18756 19117 7ff615a3e234 18755->19117 19120 7ff615a347bc 18756->19120 18760 7ff615a466b4 18762 7ff615a466c5 18760->18762 18764 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18760->18764 18761 7ff615a34178 45 API calls 18763 7ff615a46637 18761->18763 18765 7ff615a3feb3 18762->18765 18767 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18762->18767 18766 7ff615a3e234 5 API calls 18763->18766 18768 7ff615a46640 18763->18768 18764->18762 18765->18617 18765->18618 18766->18768 18767->18765 18769 7ff615a347bc 14 API calls 18768->18769 18770 7ff615a4669b 18769->18770 18770->18760 18771 7ff615a466a3 SetEnvironmentVariableW 18770->18771 18771->18760 18773 7ff615a403bc 18772->18773 18774 7ff615a4039f 18772->18774 18775 7ff615a3dea8 _set_fmode 11 API calls 18773->18775 18774->18630 18781 7ff615a403e0 18775->18781 18776 7ff615a39814 __CxxCallCatchBlock 45 API calls 18778 7ff615a4046a 18776->18778 18777 7ff615a40441 18779 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18777->18779 18779->18774 18780 7ff615a3dea8 _set_fmode 11 API calls 18780->18781 18781->18777 18781->18780 18782 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18781->18782 18783 7ff615a3f784 37 API calls 18781->18783 18784 7ff615a40450 18781->18784 18786 7ff615a40464 18781->18786 18782->18781 18783->18781 18785 7ff615a39c10 _isindst 17 API calls 18784->18785 18785->18786 18786->18776 18788 7ff615a38a2d 18787->18788 18789 7ff615a38a24 18787->18789 18788->18648 18788->18649 18789->18788 19142 7ff615a38524 18789->19142 18794 7ff615a46309 18793->18794 18798 7ff615a46336 18793->18798 18795 7ff615a4630e 18794->18795 18794->18798 18796 7ff615a343f4 _set_fmode 11 API calls 18795->18796 18799 7ff615a46313 18796->18799 18797 7ff615a4637a 18800 7ff615a343f4 _set_fmode 11 API calls 18797->18800 18798->18797 18801 7ff615a46399 18798->18801 18815 7ff615a4636e __crtLCMapStringW 18798->18815 18802 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18799->18802 18803 7ff615a4637f 18800->18803 18804 7ff615a463b5 18801->18804 18805 7ff615a463a3 18801->18805 18806 7ff615a4631e 18802->18806 18808 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18803->18808 18807 7ff615a34178 45 API calls 18804->18807 18809 7ff615a343f4 _set_fmode 11 API calls 18805->18809 18806->18642 18811 7ff615a463c2 18807->18811 18808->18815 18810 7ff615a463a8 18809->18810 18812 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18810->18812 18811->18815 19189 7ff615a47e18 18811->19189 18812->18815 18815->18642 18816 7ff615a343f4 _set_fmode 11 API calls 18816->18815 18818 7ff615a384c9 18817->18818 18827 7ff615a384c5 18817->18827 18840 7ff615a41900 18818->18840 18823 7ff615a384e7 18866 7ff615a38594 18823->18866 18824 7ff615a384db 18825 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18824->18825 18825->18827 18827->18704 18832 7ff615a38804 18827->18832 18829 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18830 7ff615a3850e 18829->18830 18831 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18830->18831 18831->18827 18833 7ff615a3882d 18832->18833 18838 7ff615a38846 18832->18838 18833->18704 18834 7ff615a3dea8 _set_fmode 11 API calls 18834->18838 18835 7ff615a388d6 18837 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18835->18837 18836 7ff615a3faf8 WideCharToMultiByte 18836->18838 18837->18833 18838->18833 18838->18834 18838->18835 18838->18836 18839 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18838->18839 18839->18838 18841 7ff615a384ce 18840->18841 18842 7ff615a4190d 18840->18842 18846 7ff615a41c3c GetEnvironmentStringsW 18841->18846 18885 7ff615a3a534 18842->18885 18847 7ff615a41c6c 18846->18847 18848 7ff615a384d3 18846->18848 18849 7ff615a3faf8 WideCharToMultiByte 18847->18849 18848->18823 18848->18824 18850 7ff615a41cbd 18849->18850 18851 7ff615a41cc4 FreeEnvironmentStringsW 18850->18851 18852 7ff615a3c90c _fread_nolock 12 API calls 18850->18852 18851->18848 18853 7ff615a41cd7 18852->18853 18854 7ff615a41ce8 18853->18854 18855 7ff615a41cdf 18853->18855 18857 7ff615a3faf8 WideCharToMultiByte 18854->18857 18856 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18855->18856 18859 7ff615a41ce6 18856->18859 18858 7ff615a41d0b 18857->18858 18860 7ff615a41d19 18858->18860 18861 7ff615a41d0f 18858->18861 18859->18851 18863 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18860->18863 18862 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18861->18862 18864 7ff615a41d17 FreeEnvironmentStringsW 18862->18864 18863->18864 18864->18848 18867 7ff615a385b9 18866->18867 18868 7ff615a3dea8 _set_fmode 11 API calls 18867->18868 18878 7ff615a385ef 18868->18878 18869 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18870 7ff615a384ef 18869->18870 18870->18829 18871 7ff615a3866a 18872 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18871->18872 18872->18870 18873 7ff615a3dea8 _set_fmode 11 API calls 18873->18878 18874 7ff615a38659 19043 7ff615a387c0 18874->19043 18875 7ff615a397b4 __std_exception_copy 37 API calls 18875->18878 18878->18871 18878->18873 18878->18874 18878->18875 18879 7ff615a3868f 18878->18879 18882 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18878->18882 18883 7ff615a385f7 18878->18883 18881 7ff615a39c10 _isindst 17 API calls 18879->18881 18880 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18880->18883 18884 7ff615a386a2 18881->18884 18882->18878 18883->18869 18886 7ff615a3a560 FlsSetValue 18885->18886 18887 7ff615a3a545 FlsGetValue 18885->18887 18889 7ff615a3a552 18886->18889 18890 7ff615a3a56d 18886->18890 18888 7ff615a3a55a 18887->18888 18887->18889 18888->18886 18891 7ff615a3a558 18889->18891 18892 7ff615a39814 __CxxCallCatchBlock 45 API calls 18889->18892 18893 7ff615a3dea8 _set_fmode 11 API calls 18890->18893 18905 7ff615a415d4 18891->18905 18894 7ff615a3a5d5 18892->18894 18895 7ff615a3a57c 18893->18895 18896 7ff615a3a59a FlsSetValue 18895->18896 18897 7ff615a3a58a FlsSetValue 18895->18897 18899 7ff615a3a5b8 18896->18899 18900 7ff615a3a5a6 FlsSetValue 18896->18900 18898 7ff615a3a593 18897->18898 18901 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18898->18901 18902 7ff615a3a204 _set_fmode 11 API calls 18899->18902 18900->18898 18901->18889 18903 7ff615a3a5c0 18902->18903 18904 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18903->18904 18904->18891 18928 7ff615a41844 18905->18928 18907 7ff615a41609 18943 7ff615a412d4 18907->18943 18910 7ff615a3c90c _fread_nolock 12 API calls 18911 7ff615a41637 18910->18911 18912 7ff615a4163f 18911->18912 18914 7ff615a4164e 18911->18914 18913 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18912->18913 18927 7ff615a41626 18913->18927 18914->18914 18950 7ff615a4197c 18914->18950 18917 7ff615a4174a 18918 7ff615a343f4 _set_fmode 11 API calls 18917->18918 18919 7ff615a4174f 18918->18919 18921 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18919->18921 18920 7ff615a417a5 18926 7ff615a4180c 18920->18926 18961 7ff615a41104 18920->18961 18921->18927 18922 7ff615a41764 18922->18920 18924 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18922->18924 18923 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18923->18927 18924->18920 18926->18923 18927->18841 18929 7ff615a41867 18928->18929 18931 7ff615a41871 18929->18931 18976 7ff615a3f5e8 EnterCriticalSection 18929->18976 18934 7ff615a418e3 18931->18934 18936 7ff615a39814 __CxxCallCatchBlock 45 API calls 18931->18936 18934->18907 18937 7ff615a418fb 18936->18937 18938 7ff615a41952 18937->18938 18940 7ff615a3a534 50 API calls 18937->18940 18938->18907 18941 7ff615a4193c 18940->18941 18942 7ff615a415d4 65 API calls 18941->18942 18942->18938 18944 7ff615a34178 45 API calls 18943->18944 18945 7ff615a412e8 18944->18945 18946 7ff615a41306 18945->18946 18947 7ff615a412f4 GetOEMCP 18945->18947 18948 7ff615a4130b GetACP 18946->18948 18949 7ff615a4131b 18946->18949 18947->18949 18948->18949 18949->18910 18949->18927 18951 7ff615a412d4 47 API calls 18950->18951 18952 7ff615a419a9 18951->18952 18953 7ff615a41aff 18952->18953 18955 7ff615a419e6 IsValidCodePage 18952->18955 18960 7ff615a41a00 memcpy_s 18952->18960 18954 7ff615a2b870 _log10_special 8 API calls 18953->18954 18956 7ff615a41741 18954->18956 18955->18953 18957 7ff615a419f7 18955->18957 18956->18917 18956->18922 18958 7ff615a41a26 GetCPInfo 18957->18958 18957->18960 18958->18953 18958->18960 18977 7ff615a413ec 18960->18977 19042 7ff615a3f5e8 EnterCriticalSection 18961->19042 18978 7ff615a41429 GetCPInfo 18977->18978 18987 7ff615a4151f 18977->18987 18984 7ff615a4143c 18978->18984 18978->18987 18979 7ff615a2b870 _log10_special 8 API calls 18981 7ff615a415be 18979->18981 18980 7ff615a42150 48 API calls 18982 7ff615a414b3 18980->18982 18981->18953 18988 7ff615a46e94 18982->18988 18984->18980 18986 7ff615a46e94 54 API calls 18986->18987 18987->18979 18989 7ff615a34178 45 API calls 18988->18989 18990 7ff615a46eb9 18989->18990 18993 7ff615a46b60 18990->18993 18994 7ff615a46ba1 18993->18994 18995 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 18994->18995 18999 7ff615a46beb 18995->18999 18996 7ff615a46e69 18998 7ff615a2b870 _log10_special 8 API calls 18996->18998 18997 7ff615a46d21 18997->18996 19002 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18997->19002 19000 7ff615a414e6 18998->19000 18999->18996 18999->18997 19001 7ff615a3c90c _fread_nolock 12 API calls 18999->19001 19003 7ff615a46c23 18999->19003 19000->18986 19001->19003 19002->18996 19003->18997 19004 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 19003->19004 19005 7ff615a46c96 19004->19005 19005->18997 19024 7ff615a3e3f4 19005->19024 19008 7ff615a46ce1 19008->18997 19011 7ff615a3e3f4 __crtLCMapStringW 6 API calls 19008->19011 19009 7ff615a46d32 19010 7ff615a3c90c _fread_nolock 12 API calls 19009->19010 19012 7ff615a46e04 19009->19012 19013 7ff615a46d50 19009->19013 19010->19013 19011->18997 19012->18997 19014 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19012->19014 19013->18997 19015 7ff615a3e3f4 __crtLCMapStringW 6 API calls 19013->19015 19014->18997 19016 7ff615a46dd0 19015->19016 19016->19012 19017 7ff615a46e06 19016->19017 19018 7ff615a46df0 19016->19018 19019 7ff615a3faf8 WideCharToMultiByte 19017->19019 19020 7ff615a3faf8 WideCharToMultiByte 19018->19020 19021 7ff615a46dfe 19019->19021 19020->19021 19021->19012 19022 7ff615a46e1e 19021->19022 19022->18997 19023 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19022->19023 19023->18997 19030 7ff615a3e020 19024->19030 19027 7ff615a3e43a 19027->18997 19027->19008 19027->19009 19029 7ff615a3e4a3 LCMapStringW 19029->19027 19031 7ff615a3e078 __vcrt_InitializeCriticalSectionEx 19030->19031 19032 7ff615a3e07d 19030->19032 19031->19032 19033 7ff615a3e0ad LoadLibraryExW 19031->19033 19034 7ff615a3e1a2 GetProcAddress 19031->19034 19038 7ff615a3e10c LoadLibraryExW 19031->19038 19032->19027 19039 7ff615a3e4e0 19032->19039 19035 7ff615a3e182 19033->19035 19036 7ff615a3e0d2 GetLastError 19033->19036 19034->19032 19035->19034 19037 7ff615a3e199 FreeLibrary 19035->19037 19036->19031 19037->19034 19038->19031 19038->19035 19040 7ff615a3e020 __crtLCMapStringW 5 API calls 19039->19040 19041 7ff615a3e50e __crtLCMapStringW 19040->19041 19041->19029 19044 7ff615a387c5 19043->19044 19048 7ff615a38661 19043->19048 19045 7ff615a387ee 19044->19045 19047 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19044->19047 19046 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19045->19046 19046->19048 19047->19044 19048->18880 19050 7ff615a455e8 19049->19050 19051 7ff615a455d1 19049->19051 19050->19051 19053 7ff615a455f6 19050->19053 19052 7ff615a343f4 _set_fmode 11 API calls 19051->19052 19054 7ff615a455d6 19052->19054 19056 7ff615a34178 45 API calls 19053->19056 19057 7ff615a455e1 19053->19057 19055 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 19054->19055 19055->19057 19056->19057 19057->18719 19059 7ff615a34178 45 API calls 19058->19059 19060 7ff615a48281 19059->19060 19063 7ff615a47ed8 19060->19063 19065 7ff615a47f26 19063->19065 19064 7ff615a2b870 _log10_special 8 API calls 19066 7ff615a46515 19064->19066 19068 7ff615a47f98 GetCPInfo 19065->19068 19069 7ff615a47fad 19065->19069 19072 7ff615a47fb1 19065->19072 19066->18719 19066->18743 19067 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 19070 7ff615a48045 19067->19070 19068->19069 19068->19072 19069->19067 19069->19072 19071 7ff615a3c90c _fread_nolock 12 API calls 19070->19071 19070->19072 19073 7ff615a4807c 19070->19073 19071->19073 19072->19064 19073->19072 19074 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 19073->19074 19075 7ff615a480ea 19074->19075 19076 7ff615a481cc 19075->19076 19077 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 19075->19077 19076->19072 19078 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19076->19078 19079 7ff615a48110 19077->19079 19078->19072 19079->19076 19080 7ff615a3c90c _fread_nolock 12 API calls 19079->19080 19081 7ff615a4813d 19079->19081 19080->19081 19081->19076 19082 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 19081->19082 19083 7ff615a481b4 19082->19083 19084 7ff615a481ba 19083->19084 19085 7ff615a481d4 19083->19085 19084->19076 19088 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19084->19088 19092 7ff615a3e278 19085->19092 19088->19076 19089 7ff615a48213 19089->19072 19091 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19089->19091 19090 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19090->19089 19091->19072 19093 7ff615a3e020 __crtLCMapStringW 5 API calls 19092->19093 19094 7ff615a3e2b6 19093->19094 19095 7ff615a3e4e0 __crtLCMapStringW 5 API calls 19094->19095 19097 7ff615a3e2be 19094->19097 19096 7ff615a3e327 CompareStringW 19095->19096 19096->19097 19097->19089 19097->19090 19099 7ff615a46f6a HeapSize 19098->19099 19100 7ff615a46f51 19098->19100 19101 7ff615a343f4 _set_fmode 11 API calls 19100->19101 19102 7ff615a46f56 19101->19102 19103 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 19102->19103 19104 7ff615a46f61 19103->19104 19104->18748 19106 7ff615a46f99 19105->19106 19107 7ff615a46fa3 19105->19107 19108 7ff615a3c90c _fread_nolock 12 API calls 19106->19108 19109 7ff615a46fa8 19107->19109 19115 7ff615a46faf _set_fmode 19107->19115 19114 7ff615a46fa1 19108->19114 19112 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19109->19112 19110 7ff615a46fb5 19113 7ff615a343f4 _set_fmode 11 API calls 19110->19113 19111 7ff615a46fe2 HeapReAlloc 19111->19114 19111->19115 19112->19114 19113->19114 19114->18752 19115->19110 19115->19111 19116 7ff615a428a0 _set_fmode 2 API calls 19115->19116 19116->19115 19118 7ff615a3e020 __crtLCMapStringW 5 API calls 19117->19118 19119 7ff615a3e254 19118->19119 19119->18756 19121 7ff615a347e6 19120->19121 19122 7ff615a3480a 19120->19122 19126 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19121->19126 19129 7ff615a347f5 19121->19129 19123 7ff615a3480f 19122->19123 19124 7ff615a34864 19122->19124 19127 7ff615a34824 19123->19127 19123->19129 19130 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19123->19130 19125 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 19124->19125 19137 7ff615a34880 19125->19137 19126->19129 19131 7ff615a3c90c _fread_nolock 12 API calls 19127->19131 19128 7ff615a34887 GetLastError 19132 7ff615a34368 _fread_nolock 11 API calls 19128->19132 19129->18760 19129->18761 19130->19127 19131->19129 19135 7ff615a34894 19132->19135 19133 7ff615a348c2 19133->19129 19134 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 19133->19134 19138 7ff615a34906 19134->19138 19139 7ff615a343f4 _set_fmode 11 API calls 19135->19139 19136 7ff615a348b5 19141 7ff615a3c90c _fread_nolock 12 API calls 19136->19141 19137->19128 19137->19133 19137->19136 19140 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19137->19140 19138->19128 19138->19129 19139->19129 19140->19136 19141->19133 19143 7ff615a38539 19142->19143 19144 7ff615a3853d 19142->19144 19143->18788 19155 7ff615a388e4 19143->19155 19163 7ff615a41d4c GetEnvironmentStringsW 19144->19163 19147 7ff615a38556 19170 7ff615a386a4 19147->19170 19148 7ff615a3854a 19149 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19148->19149 19149->19143 19152 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19153 7ff615a3857d 19152->19153 19154 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19153->19154 19154->19143 19156 7ff615a38907 19155->19156 19159 7ff615a3891e 19155->19159 19156->18788 19157 7ff615a3ebb0 MultiByteToWideChar _fread_nolock 19157->19159 19158 7ff615a3dea8 _set_fmode 11 API calls 19158->19159 19159->19156 19159->19157 19159->19158 19160 7ff615a38992 19159->19160 19162 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19159->19162 19161 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19160->19161 19161->19156 19162->19159 19164 7ff615a41d70 19163->19164 19165 7ff615a38542 19163->19165 19166 7ff615a3c90c _fread_nolock 12 API calls 19164->19166 19165->19147 19165->19148 19168 7ff615a41da7 memcpy_s 19166->19168 19167 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19169 7ff615a41dc7 FreeEnvironmentStringsW 19167->19169 19168->19167 19169->19165 19171 7ff615a386cc 19170->19171 19172 7ff615a3dea8 _set_fmode 11 API calls 19171->19172 19184 7ff615a38707 19172->19184 19173 7ff615a3870f 19174 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19173->19174 19176 7ff615a3855e 19174->19176 19175 7ff615a38789 19177 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19175->19177 19176->19152 19177->19176 19178 7ff615a3dea8 _set_fmode 11 API calls 19178->19184 19179 7ff615a38778 19181 7ff615a387c0 11 API calls 19179->19181 19180 7ff615a3f784 37 API calls 19180->19184 19182 7ff615a38780 19181->19182 19183 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19182->19183 19183->19173 19184->19173 19184->19175 19184->19178 19184->19179 19184->19180 19185 7ff615a387ac 19184->19185 19187 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19184->19187 19186 7ff615a39c10 _isindst 17 API calls 19185->19186 19188 7ff615a387be 19186->19188 19187->19184 19190 7ff615a47e41 __crtLCMapStringW 19189->19190 19191 7ff615a463fe 19190->19191 19192 7ff615a3e278 6 API calls 19190->19192 19191->18815 19191->18816 19192->19191 16065 7ff615a2bf5c 16086 7ff615a2c12c 16065->16086 16068 7ff615a2c0a8 16209 7ff615a2c44c IsProcessorFeaturePresent 16068->16209 16069 7ff615a2bf78 __scrt_acquire_startup_lock 16071 7ff615a2c0b2 16069->16071 16073 7ff615a2bf96 __scrt_release_startup_lock 16069->16073 16072 7ff615a2c44c 7 API calls 16071->16072 16075 7ff615a2c0bd __CxxCallCatchBlock 16072->16075 16074 7ff615a2bfbb 16073->16074 16076 7ff615a2c041 16073->16076 16198 7ff615a38e44 16073->16198 16092 7ff615a2c594 16076->16092 16078 7ff615a2c046 16095 7ff615a21000 16078->16095 16083 7ff615a2c069 16083->16075 16205 7ff615a2c2b0 16083->16205 16087 7ff615a2c134 16086->16087 16088 7ff615a2c140 __scrt_dllmain_crt_thread_attach 16087->16088 16089 7ff615a2bf70 16088->16089 16090 7ff615a2c14d 16088->16090 16089->16068 16089->16069 16090->16089 16216 7ff615a2cba8 16090->16216 16093 7ff615a497e0 memcpy_s 16092->16093 16094 7ff615a2c5ab GetStartupInfoW 16093->16094 16094->16078 16096 7ff615a21009 16095->16096 16243 7ff615a34794 16096->16243 16098 7ff615a2352b 16250 7ff615a233e0 16098->16250 16101 7ff615a23538 16103 7ff615a2b870 _log10_special 8 API calls 16101->16103 16105 7ff615a2372a 16103->16105 16203 7ff615a2c5d8 GetModuleHandleW 16105->16203 16106 7ff615a23736 16441 7ff615a23f70 16106->16441 16107 7ff615a2356c 16109 7ff615a21bf0 49 API calls 16107->16109 16115 7ff615a23588 16109->16115 16111 7ff615a23785 16113 7ff615a225f0 53 API calls 16111->16113 16113->16101 16312 7ff615a27e10 16115->16312 16116 7ff615a2365f __std_exception_destroy 16123 7ff615a27e10 14 API calls 16116->16123 16151 7ff615a23834 16116->16151 16117 7ff615a23778 16118 7ff615a2377d 16117->16118 16119 7ff615a2379f 16117->16119 16460 7ff615a2f36c 16118->16460 16120 7ff615a21bf0 49 API calls 16119->16120 16122 7ff615a237be 16120->16122 16130 7ff615a218f0 115 API calls 16122->16130 16125 7ff615a236ae 16123->16125 16325 7ff615a27f80 16125->16325 16126 7ff615a23852 16128 7ff615a23871 16126->16128 16129 7ff615a23865 16126->16129 16133 7ff615a21bf0 49 API calls 16128->16133 16467 7ff615a23fe0 16129->16467 16134 7ff615a237df 16130->16134 16131 7ff615a236bd 16135 7ff615a2380f 16131->16135 16138 7ff615a236cf 16131->16138 16149 7ff615a23805 __std_exception_destroy 16133->16149 16134->16115 16137 7ff615a237ef 16134->16137 16334 7ff615a28400 16135->16334 16142 7ff615a225f0 53 API calls 16137->16142 16330 7ff615a21bf0 16138->16330 16141 7ff615a2389e SetDllDirectoryW 16147 7ff615a238c3 16141->16147 16142->16101 16152 7ff615a23a50 16147->16152 16390 7ff615a26560 16147->16390 16148 7ff615a236fc 16430 7ff615a225f0 16148->16430 16385 7ff615a286b0 16149->16385 16151->16149 16464 7ff615a23e90 16151->16464 16154 7ff615a23a5a PostMessageW GetMessageW 16152->16154 16155 7ff615a23a7d 16152->16155 16154->16155 16525 7ff615a23080 16155->16525 16158 7ff615a238ea 16160 7ff615a23947 16158->16160 16162 7ff615a23901 16158->16162 16470 7ff615a265a0 16158->16470 16160->16152 16166 7ff615a2395c 16160->16166 16174 7ff615a23905 16162->16174 16491 7ff615a26970 16162->16491 16410 7ff615a230e0 16166->16410 16174->16160 16507 7ff615a22870 16174->16507 16199 7ff615a38e7c 16198->16199 16200 7ff615a38e5b 16198->16200 18440 7ff615a396e8 16199->18440 16200->16076 16204 7ff615a2c5e9 16203->16204 16204->16083 16207 7ff615a2c2c1 16205->16207 16206 7ff615a2c080 16206->16074 16207->16206 16208 7ff615a2cba8 7 API calls 16207->16208 16208->16206 16210 7ff615a2c472 _isindst memcpy_s 16209->16210 16211 7ff615a2c491 RtlCaptureContext RtlLookupFunctionEntry 16210->16211 16212 7ff615a2c4f6 memcpy_s 16211->16212 16213 7ff615a2c4ba RtlVirtualUnwind 16211->16213 16214 7ff615a2c528 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16212->16214 16213->16212 16215 7ff615a2c576 _isindst 16214->16215 16215->16071 16217 7ff615a2cbba 16216->16217 16218 7ff615a2cbb0 16216->16218 16217->16089 16222 7ff615a2cf44 16218->16222 16223 7ff615a2cf53 16222->16223 16225 7ff615a2cbb5 16222->16225 16230 7ff615a2d180 16223->16230 16226 7ff615a2cfb0 16225->16226 16227 7ff615a2cfdb 16226->16227 16228 7ff615a2cfbe DeleteCriticalSection 16227->16228 16229 7ff615a2cfdf 16227->16229 16228->16227 16229->16217 16234 7ff615a2cfe8 16230->16234 16235 7ff615a2d0d2 TlsFree 16234->16235 16241 7ff615a2d02c __vcrt_InitializeCriticalSectionEx 16234->16241 16236 7ff615a2d05a LoadLibraryExW 16238 7ff615a2d0f9 16236->16238 16239 7ff615a2d07b GetLastError 16236->16239 16237 7ff615a2d119 GetProcAddress 16237->16235 16238->16237 16240 7ff615a2d110 FreeLibrary 16238->16240 16239->16241 16240->16237 16241->16235 16241->16236 16241->16237 16242 7ff615a2d09d LoadLibraryExW 16241->16242 16242->16238 16242->16241 16246 7ff615a3e790 16243->16246 16244 7ff615a3e7e3 16245 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16244->16245 16249 7ff615a3e80c 16245->16249 16246->16244 16247 7ff615a3e836 16246->16247 16538 7ff615a3e668 16247->16538 16249->16098 16546 7ff615a2bb70 16250->16546 16253 7ff615a23438 16548 7ff615a285a0 FindFirstFileExW 16253->16548 16254 7ff615a2341b 16553 7ff615a229e0 16254->16553 16258 7ff615a2344b 16563 7ff615a28620 CreateFileW 16258->16563 16259 7ff615a234a5 16572 7ff615a28760 16259->16572 16261 7ff615a2b870 _log10_special 8 API calls 16264 7ff615a234dd 16261->16264 16263 7ff615a234b3 16266 7ff615a2342e 16263->16266 16269 7ff615a226c0 49 API calls 16263->16269 16264->16101 16272 7ff615a218f0 16264->16272 16266->16261 16267 7ff615a2345c 16566 7ff615a226c0 16267->16566 16268 7ff615a23474 __vcrt_InitializeCriticalSectionEx 16268->16259 16269->16266 16273 7ff615a23f70 108 API calls 16272->16273 16274 7ff615a21925 16273->16274 16275 7ff615a21bb6 16274->16275 16277 7ff615a276a0 83 API calls 16274->16277 16276 7ff615a2b870 _log10_special 8 API calls 16275->16276 16278 7ff615a21bd1 16276->16278 16279 7ff615a2196b 16277->16279 16278->16106 16278->16107 16287 7ff615a2199c 16279->16287 16936 7ff615a2f9f4 16279->16936 16280 7ff615a2f36c 74 API calls 16280->16275 16282 7ff615a21985 16283 7ff615a21989 16282->16283 16284 7ff615a219a1 16282->16284 16943 7ff615a22760 16283->16943 16940 7ff615a2f6bc 16284->16940 16287->16280 16289 7ff615a219d7 16292 7ff615a21a06 16289->16292 16293 7ff615a219ee 16289->16293 16290 7ff615a219bf 16291 7ff615a22760 53 API calls 16290->16291 16291->16287 16295 7ff615a21bf0 49 API calls 16292->16295 16294 7ff615a22760 53 API calls 16293->16294 16294->16287 16296 7ff615a21a1d 16295->16296 16297 7ff615a21bf0 49 API calls 16296->16297 16298 7ff615a21a68 16297->16298 16299 7ff615a2f9f4 73 API calls 16298->16299 16300 7ff615a21a8c 16299->16300 16301 7ff615a21ab9 16300->16301 16302 7ff615a21aa1 16300->16302 16304 7ff615a2f6bc _fread_nolock 53 API calls 16301->16304 16303 7ff615a22760 53 API calls 16302->16303 16303->16287 16305 7ff615a21ace 16304->16305 16306 7ff615a21aec 16305->16306 16307 7ff615a21ad4 16305->16307 16960 7ff615a2f430 16306->16960 16309 7ff615a22760 53 API calls 16307->16309 16309->16287 16311 7ff615a225f0 53 API calls 16311->16287 16313 7ff615a27e1a 16312->16313 16314 7ff615a286b0 2 API calls 16313->16314 16315 7ff615a27e39 GetEnvironmentVariableW 16314->16315 16316 7ff615a27e56 ExpandEnvironmentStringsW 16315->16316 16317 7ff615a27ea2 16315->16317 16316->16317 16318 7ff615a27e78 16316->16318 16319 7ff615a2b870 _log10_special 8 API calls 16317->16319 16320 7ff615a28760 2 API calls 16318->16320 16321 7ff615a27eb4 16319->16321 16322 7ff615a27e8a 16320->16322 16321->16116 16323 7ff615a2b870 _log10_special 8 API calls 16322->16323 16324 7ff615a27e9a 16323->16324 16324->16116 16326 7ff615a286b0 2 API calls 16325->16326 16327 7ff615a27f94 16326->16327 17169 7ff615a37548 16327->17169 16329 7ff615a27fa6 __std_exception_destroy 16329->16131 16331 7ff615a21c15 16330->16331 16332 7ff615a33ca4 49 API calls 16331->16332 16333 7ff615a21c38 16332->16333 16333->16148 16333->16149 16335 7ff615a28415 16334->16335 17187 7ff615a27b50 GetCurrentProcess OpenProcessToken 16335->17187 16338 7ff615a27b50 7 API calls 16339 7ff615a28441 16338->16339 16340 7ff615a2845a 16339->16340 16341 7ff615a28474 16339->16341 16342 7ff615a22590 48 API calls 16340->16342 16343 7ff615a22590 48 API calls 16341->16343 16344 7ff615a28472 16342->16344 16345 7ff615a28487 LocalFree LocalFree 16343->16345 16344->16345 16386 7ff615a286d2 MultiByteToWideChar 16385->16386 16388 7ff615a286f6 16385->16388 16386->16388 16389 7ff615a2870c __std_exception_destroy 16386->16389 16387 7ff615a28713 MultiByteToWideChar 16387->16389 16388->16387 16388->16389 16389->16141 16391 7ff615a26575 16390->16391 16392 7ff615a238d5 16391->16392 16393 7ff615a22760 53 API calls 16391->16393 16394 7ff615a26b00 16392->16394 16393->16392 16395 7ff615a26b30 16394->16395 16404 7ff615a26b4a __std_exception_destroy 16394->16404 16395->16404 17381 7ff615a21440 16395->17381 16397 7ff615a26b54 16398 7ff615a23fe0 49 API calls 16397->16398 16397->16404 16399 7ff615a26b76 16398->16399 16400 7ff615a26b7b 16399->16400 16401 7ff615a23fe0 49 API calls 16399->16401 16402 7ff615a22870 53 API calls 16400->16402 16403 7ff615a26b9a 16401->16403 16402->16404 16403->16400 16405 7ff615a23fe0 49 API calls 16403->16405 16404->16158 16422 7ff615a230ee memcpy_s 16410->16422 16411 7ff615a2b870 _log10_special 8 API calls 16412 7ff615a2338e 16411->16412 16412->16101 16429 7ff615a283e0 LocalFree 16412->16429 16413 7ff615a232e7 16413->16411 16415 7ff615a21bf0 49 API calls 16415->16422 16416 7ff615a23309 16418 7ff615a225f0 53 API calls 16416->16418 16418->16413 16421 7ff615a232e9 16424 7ff615a225f0 53 API calls 16421->16424 16422->16413 16422->16415 16422->16416 16422->16421 16423 7ff615a22870 53 API calls 16422->16423 16427 7ff615a232f7 16422->16427 17442 7ff615a23f10 16422->17442 17448 7ff615a27530 16422->17448 17459 7ff615a215c0 16422->17459 17497 7ff615a268e0 16422->17497 17501 7ff615a23b40 16422->17501 17545 7ff615a23e00 16422->17545 16423->16422 16424->16413 16428 7ff615a225f0 53 API calls 16427->16428 16428->16413 16431 7ff615a2262a 16430->16431 16432 7ff615a33ca4 49 API calls 16431->16432 16433 7ff615a22652 16432->16433 16442 7ff615a23f7c 16441->16442 16443 7ff615a286b0 2 API calls 16442->16443 16444 7ff615a23fa4 16443->16444 16445 7ff615a286b0 2 API calls 16444->16445 16446 7ff615a23fb7 16445->16446 17665 7ff615a352a4 16446->17665 16449 7ff615a2b870 _log10_special 8 API calls 16450 7ff615a23746 16449->16450 16450->16111 16451 7ff615a276a0 16450->16451 16452 7ff615a276c4 16451->16452 16453 7ff615a2f9f4 73 API calls 16452->16453 16456 7ff615a2779b __std_exception_destroy 16452->16456 16454 7ff615a276e0 16453->16454 16454->16456 18056 7ff615a36bd8 16454->18056 16456->16117 16457 7ff615a2f9f4 73 API calls 16459 7ff615a276f5 16457->16459 16458 7ff615a2f6bc _fread_nolock 53 API calls 16458->16459 16459->16456 16459->16457 16459->16458 16461 7ff615a2f39c 16460->16461 18071 7ff615a2f148 16461->18071 16463 7ff615a2f3b5 16463->16111 16465 7ff615a21bf0 49 API calls 16464->16465 16466 7ff615a23ead 16465->16466 16466->16126 16468 7ff615a21bf0 49 API calls 16467->16468 16469 7ff615a24010 16468->16469 16469->16149 16471 7ff615a265bc 16470->16471 16473 7ff615a217e0 45 API calls 16471->16473 16475 7ff615a2675d 16471->16475 16476 7ff615a21bf0 49 API calls 16471->16476 16478 7ff615a266df 16471->16478 16479 7ff615a2674a 16471->16479 16481 7ff615a23f10 10 API calls 16471->16481 16482 7ff615a2670d 16471->16482 16483 7ff615a27530 52 API calls 16471->16483 16485 7ff615a22870 53 API calls 16471->16485 16486 7ff615a26737 16471->16486 16488 7ff615a215c0 118 API calls 16471->16488 16489 7ff615a26720 16471->16489 16472 7ff615a2b870 _log10_special 8 API calls 16474 7ff615a266f1 16472->16474 16473->16471 16474->16162 16477 7ff615a225f0 53 API calls 16475->16477 16476->16471 16477->16478 16478->16472 16480 7ff615a225f0 53 API calls 16479->16480 16480->16478 16481->16471 16484 7ff615a225f0 53 API calls 16482->16484 16483->16471 16484->16478 16485->16471 16487 7ff615a225f0 53 API calls 16486->16487 16487->16478 16488->16471 16490 7ff615a225f0 53 API calls 16489->16490 16490->16478 18082 7ff615a281a0 16491->18082 16493 7ff615a26989 16494 7ff615a281a0 3 API calls 16493->16494 16495 7ff615a2699c 16494->16495 16496 7ff615a269cf 16495->16496 16498 7ff615a269b4 16495->16498 16508 7ff615a228aa 16507->16508 16509 7ff615a33ca4 49 API calls 16508->16509 16510 7ff615a228d2 16509->16510 16511 7ff615a286b0 2 API calls 16510->16511 16512 7ff615a228ea 16511->16512 16513 7ff615a228f7 MessageBoxW 16512->16513 16514 7ff615a2290e MessageBoxA 16512->16514 16515 7ff615a22920 16513->16515 16514->16515 16516 7ff615a2b870 _log10_special 8 API calls 16515->16516 18151 7ff615a25af0 16525->18151 16533 7ff615a230b9 16534 7ff615a233a0 16533->16534 16535 7ff615a233ae 16534->16535 16536 7ff615a233bf 16535->16536 18439 7ff615a28180 FreeLibrary 16535->18439 16545 7ff615a3477c EnterCriticalSection 16538->16545 16547 7ff615a233ec GetModuleFileNameW 16546->16547 16547->16253 16547->16254 16549 7ff615a285f2 16548->16549 16550 7ff615a285df FindClose 16548->16550 16551 7ff615a2b870 _log10_special 8 API calls 16549->16551 16550->16549 16552 7ff615a23442 16551->16552 16552->16258 16552->16259 16554 7ff615a2bb70 16553->16554 16555 7ff615a229fc GetLastError 16554->16555 16556 7ff615a22a29 16555->16556 16577 7ff615a33ef8 16556->16577 16561 7ff615a2b870 _log10_special 8 API calls 16562 7ff615a22ae5 16561->16562 16562->16266 16564 7ff615a23458 16563->16564 16565 7ff615a28660 GetFinalPathNameByHandleW CloseHandle 16563->16565 16564->16267 16564->16268 16565->16564 16567 7ff615a226fa 16566->16567 16568 7ff615a33ef8 48 API calls 16567->16568 16569 7ff615a22722 MessageBoxW 16568->16569 16570 7ff615a2b870 _log10_special 8 API calls 16569->16570 16571 7ff615a2274c 16570->16571 16571->16266 16573 7ff615a2878a WideCharToMultiByte 16572->16573 16574 7ff615a287b5 16572->16574 16573->16574 16576 7ff615a287cb __std_exception_destroy 16573->16576 16575 7ff615a287d2 WideCharToMultiByte 16574->16575 16574->16576 16575->16576 16576->16263 16580 7ff615a33f52 16577->16580 16578 7ff615a33f77 16579 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16578->16579 16583 7ff615a33fa1 16579->16583 16580->16578 16581 7ff615a33fb3 16580->16581 16599 7ff615a322b0 16581->16599 16585 7ff615a2b870 _log10_special 8 API calls 16583->16585 16584 7ff615a34094 16586 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16584->16586 16587 7ff615a22a54 FormatMessageW 16585->16587 16586->16583 16595 7ff615a22590 16587->16595 16589 7ff615a34069 16591 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16589->16591 16590 7ff615a340ba 16590->16584 16593 7ff615a340c4 16590->16593 16591->16583 16592 7ff615a34060 16592->16584 16592->16589 16594 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16593->16594 16594->16583 16596 7ff615a225b5 16595->16596 16597 7ff615a33ef8 48 API calls 16596->16597 16598 7ff615a225d8 MessageBoxW 16597->16598 16598->16561 16600 7ff615a322ee 16599->16600 16601 7ff615a322de 16599->16601 16602 7ff615a322f7 16600->16602 16608 7ff615a32325 16600->16608 16603 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16601->16603 16604 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16602->16604 16605 7ff615a3231d 16603->16605 16604->16605 16605->16584 16605->16589 16605->16590 16605->16592 16608->16601 16608->16605 16610 7ff615a32cc4 16608->16610 16643 7ff615a32710 16608->16643 16680 7ff615a31ea0 16608->16680 16611 7ff615a32d06 16610->16611 16612 7ff615a32d77 16610->16612 16613 7ff615a32d0c 16611->16613 16614 7ff615a32da1 16611->16614 16615 7ff615a32d7c 16612->16615 16616 7ff615a32dd0 16612->16616 16617 7ff615a32d40 16613->16617 16618 7ff615a32d11 16613->16618 16703 7ff615a31074 16614->16703 16619 7ff615a32db1 16615->16619 16620 7ff615a32d7e 16615->16620 16622 7ff615a32de7 16616->16622 16625 7ff615a32dda 16616->16625 16626 7ff615a32ddf 16616->16626 16623 7ff615a32d17 16617->16623 16617->16626 16618->16622 16618->16623 16710 7ff615a30c64 16619->16710 16624 7ff615a32d20 16620->16624 16632 7ff615a32d8d 16620->16632 16717 7ff615a339cc 16622->16717 16623->16624 16630 7ff615a32d52 16623->16630 16639 7ff615a32d3b 16623->16639 16641 7ff615a32e10 16624->16641 16683 7ff615a33478 16624->16683 16625->16614 16625->16626 16626->16641 16721 7ff615a31484 16626->16721 16630->16641 16693 7ff615a337b4 16630->16693 16632->16614 16633 7ff615a32d92 16632->16633 16633->16641 16699 7ff615a33878 16633->16699 16635 7ff615a2b870 _log10_special 8 API calls 16637 7ff615a3310a 16635->16637 16637->16608 16639->16641 16642 7ff615a32ffc 16639->16642 16728 7ff615a33ae0 16639->16728 16641->16635 16642->16641 16734 7ff615a3dd18 16642->16734 16644 7ff615a3271e 16643->16644 16645 7ff615a32734 16643->16645 16646 7ff615a32d06 16644->16646 16647 7ff615a32d77 16644->16647 16649 7ff615a32774 16644->16649 16648 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16645->16648 16645->16649 16650 7ff615a32d0c 16646->16650 16651 7ff615a32da1 16646->16651 16652 7ff615a32d7c 16647->16652 16653 7ff615a32dd0 16647->16653 16648->16649 16649->16608 16654 7ff615a32d40 16650->16654 16655 7ff615a32d11 16650->16655 16658 7ff615a31074 38 API calls 16651->16658 16656 7ff615a32db1 16652->16656 16657 7ff615a32d7e 16652->16657 16659 7ff615a32de7 16653->16659 16662 7ff615a32dda 16653->16662 16665 7ff615a32ddf 16653->16665 16660 7ff615a32d17 16654->16660 16654->16665 16655->16659 16655->16660 16663 7ff615a30c64 38 API calls 16656->16663 16661 7ff615a32d20 16657->16661 16669 7ff615a32d8d 16657->16669 16676 7ff615a32d3b 16658->16676 16666 7ff615a339cc 45 API calls 16659->16666 16660->16661 16667 7ff615a32d52 16660->16667 16660->16676 16664 7ff615a33478 47 API calls 16661->16664 16679 7ff615a32e10 16661->16679 16662->16651 16662->16665 16663->16676 16664->16676 16668 7ff615a31484 38 API calls 16665->16668 16665->16679 16666->16676 16671 7ff615a337b4 46 API calls 16667->16671 16667->16679 16668->16676 16669->16651 16670 7ff615a32d92 16669->16670 16673 7ff615a33878 37 API calls 16670->16673 16670->16679 16671->16676 16672 7ff615a2b870 _log10_special 8 API calls 16674 7ff615a3310a 16672->16674 16673->16676 16674->16608 16675 7ff615a33ae0 45 API calls 16678 7ff615a32ffc 16675->16678 16676->16675 16676->16678 16676->16679 16677 7ff615a3dd18 46 API calls 16677->16678 16678->16677 16678->16679 16679->16672 16919 7ff615a302e8 16680->16919 16684 7ff615a3349e 16683->16684 16746 7ff615a2fea0 16684->16746 16689 7ff615a33ae0 45 API calls 16692 7ff615a335e3 16689->16692 16690 7ff615a33ae0 45 API calls 16691 7ff615a33671 16690->16691 16691->16639 16692->16690 16692->16691 16692->16692 16695 7ff615a337e9 16693->16695 16694 7ff615a33807 16697 7ff615a3dd18 46 API calls 16694->16697 16695->16694 16696 7ff615a33ae0 45 API calls 16695->16696 16698 7ff615a3382e 16695->16698 16696->16694 16697->16698 16698->16639 16701 7ff615a33899 16699->16701 16700 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16702 7ff615a338ca 16700->16702 16701->16700 16701->16702 16702->16639 16704 7ff615a310a7 16703->16704 16705 7ff615a310d6 16704->16705 16707 7ff615a31193 16704->16707 16709 7ff615a31113 16705->16709 16889 7ff615a2ff48 16705->16889 16708 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16707->16708 16708->16709 16709->16639 16711 7ff615a30c97 16710->16711 16712 7ff615a30cc6 16711->16712 16714 7ff615a30d83 16711->16714 16713 7ff615a2ff48 12 API calls 16712->16713 16715 7ff615a30d03 16712->16715 16713->16715 16716 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16714->16716 16715->16639 16716->16715 16718 7ff615a33a0f 16717->16718 16720 7ff615a33a13 __crtLCMapStringW 16718->16720 16897 7ff615a33a68 16718->16897 16720->16639 16722 7ff615a314b7 16721->16722 16723 7ff615a314e6 16722->16723 16725 7ff615a315a3 16722->16725 16724 7ff615a2ff48 12 API calls 16723->16724 16727 7ff615a31523 16723->16727 16724->16727 16726 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16725->16726 16726->16727 16727->16639 16729 7ff615a33af7 16728->16729 16901 7ff615a3ccc8 16729->16901 16736 7ff615a3dd49 16734->16736 16743 7ff615a3dd57 16734->16743 16735 7ff615a3dd77 16738 7ff615a3dd88 16735->16738 16739 7ff615a3ddaf 16735->16739 16736->16735 16737 7ff615a33ae0 45 API calls 16736->16737 16736->16743 16737->16735 16909 7ff615a3f3b0 16738->16909 16741 7ff615a3ddd9 16739->16741 16742 7ff615a3de3a 16739->16742 16739->16743 16741->16743 16912 7ff615a3ebb0 16741->16912 16744 7ff615a3ebb0 _fread_nolock MultiByteToWideChar 16742->16744 16743->16642 16744->16743 16747 7ff615a2fec6 16746->16747 16748 7ff615a2fed7 16746->16748 16754 7ff615a3d880 16747->16754 16748->16747 16776 7ff615a3c90c 16748->16776 16751 7ff615a2ff18 16753 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16751->16753 16752 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16752->16751 16753->16747 16755 7ff615a3d89d 16754->16755 16756 7ff615a3d8d0 16754->16756 16757 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16755->16757 16756->16755 16759 7ff615a3d902 16756->16759 16758 7ff615a335c1 16757->16758 16758->16689 16758->16692 16764 7ff615a3da15 16759->16764 16766 7ff615a3d94a 16759->16766 16760 7ff615a3db07 16816 7ff615a3cd6c 16760->16816 16762 7ff615a3dacd 16809 7ff615a3d104 16762->16809 16764->16760 16764->16762 16765 7ff615a3da9c 16764->16765 16767 7ff615a3da5f 16764->16767 16769 7ff615a3da55 16764->16769 16802 7ff615a3d3e4 16765->16802 16766->16758 16783 7ff615a397b4 16766->16783 16792 7ff615a3d614 16767->16792 16769->16762 16771 7ff615a3da5a 16769->16771 16771->16765 16771->16767 16774 7ff615a39c10 _isindst 17 API calls 16775 7ff615a3db64 16774->16775 16777 7ff615a3c957 16776->16777 16782 7ff615a3c91b _set_fmode 16776->16782 16779 7ff615a343f4 _set_fmode 11 API calls 16777->16779 16778 7ff615a3c93e RtlAllocateHeap 16780 7ff615a2ff04 16778->16780 16778->16782 16779->16780 16780->16751 16780->16752 16781 7ff615a428a0 _set_fmode 2 API calls 16781->16782 16782->16777 16782->16778 16782->16781 16784 7ff615a397cb 16783->16784 16785 7ff615a397c1 16783->16785 16786 7ff615a343f4 _set_fmode 11 API calls 16784->16786 16785->16784 16790 7ff615a397e6 16785->16790 16787 7ff615a397d2 16786->16787 16788 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 16787->16788 16789 7ff615a397de 16788->16789 16789->16758 16789->16774 16790->16789 16791 7ff615a343f4 _set_fmode 11 API calls 16790->16791 16791->16787 16825 7ff615a433bc 16792->16825 16796 7ff615a3d6bc 16797 7ff615a3d6c0 16796->16797 16798 7ff615a3d711 16796->16798 16799 7ff615a3d6dc 16796->16799 16797->16758 16878 7ff615a3d200 16798->16878 16874 7ff615a3d4bc 16799->16874 16803 7ff615a433bc 38 API calls 16802->16803 16804 7ff615a3d42e 16803->16804 16805 7ff615a42e04 37 API calls 16804->16805 16806 7ff615a3d47e 16805->16806 16807 7ff615a3d482 16806->16807 16808 7ff615a3d4bc 45 API calls 16806->16808 16807->16758 16808->16807 16810 7ff615a433bc 38 API calls 16809->16810 16811 7ff615a3d14f 16810->16811 16812 7ff615a42e04 37 API calls 16811->16812 16813 7ff615a3d1a7 16812->16813 16814 7ff615a3d1ab 16813->16814 16815 7ff615a3d200 45 API calls 16813->16815 16814->16758 16815->16814 16817 7ff615a3cdb1 16816->16817 16818 7ff615a3cde4 16816->16818 16820 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16817->16820 16819 7ff615a3cdfc 16818->16819 16823 7ff615a3ce7d 16818->16823 16821 7ff615a3d104 46 API calls 16819->16821 16822 7ff615a3cddd memcpy_s 16820->16822 16821->16822 16822->16758 16823->16822 16824 7ff615a33ae0 45 API calls 16823->16824 16824->16822 16826 7ff615a4340f fegetenv 16825->16826 16827 7ff615a4713c 37 API calls 16826->16827 16832 7ff615a43462 16827->16832 16828 7ff615a4348f 16831 7ff615a397b4 __std_exception_copy 37 API calls 16828->16831 16829 7ff615a43552 16830 7ff615a4713c 37 API calls 16829->16830 16833 7ff615a4357c 16830->16833 16834 7ff615a4350d 16831->16834 16832->16829 16835 7ff615a4347d 16832->16835 16836 7ff615a4352c 16832->16836 16837 7ff615a4713c 37 API calls 16833->16837 16838 7ff615a44634 16834->16838 16844 7ff615a43515 16834->16844 16835->16828 16835->16829 16839 7ff615a397b4 __std_exception_copy 37 API calls 16836->16839 16840 7ff615a4358d 16837->16840 16841 7ff615a39c10 _isindst 17 API calls 16838->16841 16839->16834 16842 7ff615a47330 20 API calls 16840->16842 16843 7ff615a44649 16841->16843 16848 7ff615a435f6 memcpy_s 16842->16848 16845 7ff615a2b870 _log10_special 8 API calls 16844->16845 16846 7ff615a3d661 16845->16846 16870 7ff615a42e04 16846->16870 16847 7ff615a4399f memcpy_s 16848->16847 16849 7ff615a43637 memcpy_s 16848->16849 16854 7ff615a343f4 _set_fmode 11 API calls 16848->16854 16863 7ff615a43f7b memcpy_s 16849->16863 16869 7ff615a43a93 memcpy_s 16849->16869 16850 7ff615a42f20 37 API calls 16856 7ff615a443f7 16850->16856 16851 7ff615a43cdf 16851->16850 16852 7ff615a4464c memcpy_s 37 API calls 16852->16851 16853 7ff615a43c8b 16853->16851 16853->16852 16855 7ff615a43a70 16854->16855 16857 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 16855->16857 16859 7ff615a4464c memcpy_s 37 API calls 16856->16859 16868 7ff615a44452 16856->16868 16857->16849 16858 7ff615a445d8 16860 7ff615a4713c 37 API calls 16858->16860 16859->16868 16860->16844 16861 7ff615a343f4 11 API calls _set_fmode 16861->16869 16862 7ff615a343f4 11 API calls _set_fmode 16862->16863 16863->16851 16863->16853 16863->16862 16865 7ff615a39bf0 37 API calls _invalid_parameter_noinfo 16863->16865 16864 7ff615a42f20 37 API calls 16864->16868 16865->16863 16866 7ff615a39bf0 37 API calls _invalid_parameter_noinfo 16866->16869 16867 7ff615a4464c memcpy_s 37 API calls 16867->16868 16868->16858 16868->16864 16868->16867 16869->16853 16869->16861 16869->16866 16871 7ff615a42e23 16870->16871 16872 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16871->16872 16873 7ff615a42e4e memcpy_s 16871->16873 16872->16873 16873->16796 16875 7ff615a3d4e8 memcpy_s 16874->16875 16876 7ff615a3d5a2 memcpy_s 16875->16876 16877 7ff615a33ae0 45 API calls 16875->16877 16876->16797 16877->16876 16879 7ff615a3d23b 16878->16879 16884 7ff615a3d288 memcpy_s 16878->16884 16880 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16879->16880 16881 7ff615a3d267 16880->16881 16881->16797 16882 7ff615a3d2f3 16883 7ff615a397b4 __std_exception_copy 37 API calls 16882->16883 16888 7ff615a3d335 memcpy_s 16883->16888 16884->16882 16885 7ff615a33ae0 45 API calls 16884->16885 16885->16882 16886 7ff615a39c10 _isindst 17 API calls 16887 7ff615a3d3e0 16886->16887 16888->16886 16890 7ff615a2ff7f 16889->16890 16896 7ff615a2ff6e 16889->16896 16891 7ff615a3c90c _fread_nolock 12 API calls 16890->16891 16890->16896 16892 7ff615a2ffb0 16891->16892 16893 7ff615a2ffc4 16892->16893 16894 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16892->16894 16895 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16893->16895 16894->16893 16895->16896 16896->16709 16898 7ff615a33a86 16897->16898 16899 7ff615a33a8e 16897->16899 16900 7ff615a33ae0 45 API calls 16898->16900 16899->16720 16900->16899 16902 7ff615a33b1f 16901->16902 16903 7ff615a3cce1 16901->16903 16905 7ff615a3cd34 16902->16905 16903->16902 16904 7ff615a42614 45 API calls 16903->16904 16904->16902 16906 7ff615a3cd4d 16905->16906 16907 7ff615a33b2f 16905->16907 16906->16907 16908 7ff615a41960 45 API calls 16906->16908 16907->16642 16908->16907 16915 7ff615a46098 16909->16915 16914 7ff615a3ebb9 MultiByteToWideChar 16912->16914 16918 7ff615a460fc 16915->16918 16916 7ff615a2b870 _log10_special 8 API calls 16917 7ff615a3f3cd 16916->16917 16917->16743 16918->16916 16920 7ff615a3031d 16919->16920 16921 7ff615a3032f 16919->16921 16922 7ff615a343f4 _set_fmode 11 API calls 16920->16922 16924 7ff615a3033d 16921->16924 16927 7ff615a30379 16921->16927 16923 7ff615a30322 16922->16923 16925 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 16923->16925 16926 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16924->16926 16928 7ff615a3032d 16925->16928 16926->16928 16929 7ff615a306f5 16927->16929 16931 7ff615a343f4 _set_fmode 11 API calls 16927->16931 16928->16608 16929->16928 16930 7ff615a343f4 _set_fmode 11 API calls 16929->16930 16932 7ff615a30989 16930->16932 16933 7ff615a306ea 16931->16933 16934 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 16932->16934 16935 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 16933->16935 16934->16928 16935->16929 16937 7ff615a2fa24 16936->16937 16966 7ff615a2f784 16937->16966 16939 7ff615a2fa3d 16939->16282 16978 7ff615a2f6dc 16940->16978 16944 7ff615a2277c 16943->16944 16945 7ff615a343f4 _set_fmode 11 API calls 16944->16945 16946 7ff615a22799 16945->16946 16992 7ff615a33ca4 16946->16992 16951 7ff615a21bf0 49 API calls 16952 7ff615a22807 16951->16952 16953 7ff615a286b0 2 API calls 16952->16953 16954 7ff615a2281f 16953->16954 16955 7ff615a2282c MessageBoxW 16954->16955 16956 7ff615a22843 MessageBoxA 16954->16956 16957 7ff615a22855 16955->16957 16956->16957 16958 7ff615a2b870 _log10_special 8 API calls 16957->16958 16959 7ff615a22865 16958->16959 16959->16287 16961 7ff615a2f439 16960->16961 16962 7ff615a21b06 16960->16962 16963 7ff615a343f4 _set_fmode 11 API calls 16961->16963 16962->16287 16962->16311 16964 7ff615a2f43e 16963->16964 16965 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 16964->16965 16965->16962 16967 7ff615a2f7ee 16966->16967 16968 7ff615a2f7ae 16966->16968 16967->16968 16970 7ff615a2f7fa 16967->16970 16969 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16968->16969 16976 7ff615a2f7d5 16969->16976 16977 7ff615a3477c EnterCriticalSection 16970->16977 16976->16939 16979 7ff615a2f706 16978->16979 16980 7ff615a219b9 16978->16980 16979->16980 16981 7ff615a2f715 memcpy_s 16979->16981 16982 7ff615a2f752 16979->16982 16980->16289 16980->16290 16984 7ff615a343f4 _set_fmode 11 API calls 16981->16984 16991 7ff615a3477c EnterCriticalSection 16982->16991 16987 7ff615a2f72a 16984->16987 16989 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 16987->16989 16989->16980 16993 7ff615a33cfe 16992->16993 16994 7ff615a33d23 16993->16994 16995 7ff615a33d5f 16993->16995 16996 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 16994->16996 17022 7ff615a31f30 16995->17022 16998 7ff615a33d4d 16996->16998 17000 7ff615a2b870 _log10_special 8 API calls 16998->17000 16999 7ff615a33e3c 17001 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16999->17001 17003 7ff615a227d8 17000->17003 17001->16998 17010 7ff615a34480 17003->17010 17004 7ff615a33e60 17004->16999 17007 7ff615a33e6a 17004->17007 17005 7ff615a33e11 17008 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17005->17008 17006 7ff615a33e08 17006->16999 17006->17005 17009 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17007->17009 17008->16998 17009->16998 17011 7ff615a3a5d8 _set_fmode 11 API calls 17010->17011 17012 7ff615a34497 17011->17012 17013 7ff615a3dea8 _set_fmode 11 API calls 17012->17013 17016 7ff615a344d7 17012->17016 17019 7ff615a227df 17012->17019 17014 7ff615a344cc 17013->17014 17015 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17014->17015 17015->17016 17016->17019 17160 7ff615a3df30 17016->17160 17019->16951 17020 7ff615a39c10 _isindst 17 API calls 17021 7ff615a3451c 17020->17021 17023 7ff615a31f6e 17022->17023 17024 7ff615a31f5e 17022->17024 17025 7ff615a31f77 17023->17025 17032 7ff615a31fa5 17023->17032 17026 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17024->17026 17027 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17025->17027 17028 7ff615a31f9d 17026->17028 17027->17028 17028->16999 17028->17004 17028->17005 17028->17006 17029 7ff615a33ae0 45 API calls 17029->17032 17031 7ff615a32254 17034 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17031->17034 17032->17024 17032->17028 17032->17029 17032->17031 17036 7ff615a328c0 17032->17036 17062 7ff615a32588 17032->17062 17092 7ff615a31e10 17032->17092 17034->17024 17037 7ff615a32975 17036->17037 17038 7ff615a32902 17036->17038 17039 7ff615a3297a 17037->17039 17040 7ff615a329cf 17037->17040 17041 7ff615a32908 17038->17041 17042 7ff615a3299f 17038->17042 17043 7ff615a3297c 17039->17043 17044 7ff615a329af 17039->17044 17040->17042 17051 7ff615a329de 17040->17051 17060 7ff615a32938 17040->17060 17049 7ff615a3290d 17041->17049 17041->17051 17109 7ff615a30e70 17042->17109 17045 7ff615a3291d 17043->17045 17050 7ff615a3298b 17043->17050 17116 7ff615a30a60 17044->17116 17061 7ff615a32a0d 17045->17061 17095 7ff615a33224 17045->17095 17049->17045 17052 7ff615a32950 17049->17052 17049->17060 17050->17042 17054 7ff615a32990 17050->17054 17051->17061 17123 7ff615a31280 17051->17123 17052->17061 17105 7ff615a336e0 17052->17105 17057 7ff615a33878 37 API calls 17054->17057 17054->17061 17056 7ff615a2b870 _log10_special 8 API calls 17058 7ff615a32ca3 17056->17058 17057->17060 17058->17032 17060->17061 17130 7ff615a3db68 17060->17130 17061->17056 17063 7ff615a325a9 17062->17063 17064 7ff615a32593 17062->17064 17067 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17063->17067 17082 7ff615a325e7 17063->17082 17065 7ff615a32975 17064->17065 17066 7ff615a32902 17064->17066 17064->17082 17068 7ff615a3297a 17065->17068 17069 7ff615a329cf 17065->17069 17070 7ff615a32908 17066->17070 17071 7ff615a3299f 17066->17071 17067->17082 17072 7ff615a3297c 17068->17072 17073 7ff615a329af 17068->17073 17069->17071 17081 7ff615a329de 17069->17081 17090 7ff615a32938 17069->17090 17078 7ff615a3290d 17070->17078 17070->17081 17075 7ff615a30e70 38 API calls 17071->17075 17074 7ff615a3291d 17072->17074 17079 7ff615a3298b 17072->17079 17076 7ff615a30a60 38 API calls 17073->17076 17077 7ff615a33224 47 API calls 17074->17077 17091 7ff615a32a0d 17074->17091 17075->17090 17076->17090 17077->17090 17078->17074 17080 7ff615a32950 17078->17080 17078->17090 17079->17071 17084 7ff615a32990 17079->17084 17085 7ff615a336e0 47 API calls 17080->17085 17080->17091 17083 7ff615a31280 38 API calls 17081->17083 17081->17091 17082->17032 17083->17090 17087 7ff615a33878 37 API calls 17084->17087 17084->17091 17085->17090 17086 7ff615a2b870 _log10_special 8 API calls 17088 7ff615a32ca3 17086->17088 17087->17090 17088->17032 17089 7ff615a3db68 47 API calls 17089->17090 17090->17089 17090->17091 17091->17086 17143 7ff615a30034 17092->17143 17097 7ff615a33246 17095->17097 17096 7ff615a2fea0 12 API calls 17098 7ff615a3328e 17096->17098 17097->17096 17099 7ff615a3d880 46 API calls 17098->17099 17100 7ff615a33361 17099->17100 17101 7ff615a33ae0 45 API calls 17100->17101 17102 7ff615a33383 17100->17102 17101->17102 17103 7ff615a33ae0 45 API calls 17102->17103 17104 7ff615a3340c 17102->17104 17103->17104 17104->17060 17106 7ff615a336f8 17105->17106 17108 7ff615a33760 17105->17108 17107 7ff615a3db68 47 API calls 17106->17107 17106->17108 17107->17108 17108->17060 17111 7ff615a30ea3 17109->17111 17110 7ff615a30ed2 17112 7ff615a2fea0 12 API calls 17110->17112 17115 7ff615a30f0f 17110->17115 17111->17110 17113 7ff615a30f8f 17111->17113 17112->17115 17114 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17113->17114 17114->17115 17115->17060 17117 7ff615a30a93 17116->17117 17118 7ff615a30ac2 17117->17118 17120 7ff615a30b7f 17117->17120 17119 7ff615a2fea0 12 API calls 17118->17119 17122 7ff615a30aff 17118->17122 17119->17122 17121 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17120->17121 17121->17122 17122->17060 17124 7ff615a312b3 17123->17124 17125 7ff615a312e2 17124->17125 17127 7ff615a3139f 17124->17127 17126 7ff615a2fea0 12 API calls 17125->17126 17129 7ff615a3131f 17125->17129 17126->17129 17128 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17127->17128 17128->17129 17129->17060 17131 7ff615a3db90 17130->17131 17132 7ff615a33ae0 45 API calls 17131->17132 17134 7ff615a3dbd5 17131->17134 17136 7ff615a3db95 memcpy_s 17131->17136 17138 7ff615a3dbbe memcpy_s 17131->17138 17132->17134 17133 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17133->17136 17134->17136 17134->17138 17140 7ff615a3faf8 17134->17140 17136->17060 17138->17133 17138->17136 17142 7ff615a3fb1c WideCharToMultiByte 17140->17142 17144 7ff615a30061 17143->17144 17145 7ff615a30073 17143->17145 17146 7ff615a343f4 _set_fmode 11 API calls 17144->17146 17147 7ff615a300bd 17145->17147 17149 7ff615a30080 17145->17149 17148 7ff615a30066 17146->17148 17153 7ff615a343f4 _set_fmode 11 API calls 17147->17153 17159 7ff615a30166 17147->17159 17150 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 17148->17150 17151 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 17149->17151 17156 7ff615a30071 17150->17156 17151->17156 17152 7ff615a343f4 _set_fmode 11 API calls 17155 7ff615a30210 17152->17155 17154 7ff615a3015b 17153->17154 17157 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 17154->17157 17158 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 17155->17158 17156->17032 17157->17159 17158->17156 17159->17152 17159->17156 17162 7ff615a3df4d 17160->17162 17161 7ff615a3df52 17163 7ff615a344fd 17161->17163 17164 7ff615a343f4 _set_fmode 11 API calls 17161->17164 17162->17161 17162->17163 17167 7ff615a3df9c 17162->17167 17163->17019 17163->17020 17165 7ff615a3df5c 17164->17165 17166 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 17165->17166 17166->17163 17167->17163 17168 7ff615a343f4 _set_fmode 11 API calls 17167->17168 17168->17165 17170 7ff615a37568 17169->17170 17171 7ff615a37555 17169->17171 17179 7ff615a371cc 17170->17179 17172 7ff615a343f4 _set_fmode 11 API calls 17171->17172 17174 7ff615a3755a 17172->17174 17176 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 17174->17176 17177 7ff615a37566 17176->17177 17177->16329 17186 7ff615a3f5e8 EnterCriticalSection 17179->17186 17188 7ff615a27b91 GetTokenInformation 17187->17188 17189 7ff615a27c13 __std_exception_destroy 17187->17189 17190 7ff615a27bbd 17188->17190 17191 7ff615a27bb2 GetLastError 17188->17191 17192 7ff615a27c26 CloseHandle 17189->17192 17193 7ff615a27c2c 17189->17193 17190->17189 17194 7ff615a27bd9 GetTokenInformation 17190->17194 17191->17189 17191->17190 17192->17193 17193->16338 17194->17189 17195 7ff615a27bfc 17194->17195 17195->17189 17196 7ff615a27c06 ConvertSidToStringSidW 17195->17196 17196->17189 17382 7ff615a23f70 108 API calls 17381->17382 17383 7ff615a21463 17382->17383 17384 7ff615a2146b 17383->17384 17385 7ff615a2148c 17383->17385 17386 7ff615a225f0 53 API calls 17384->17386 17387 7ff615a2f9f4 73 API calls 17385->17387 17388 7ff615a2147b 17386->17388 17389 7ff615a214a1 17387->17389 17388->16397 17390 7ff615a214c1 17389->17390 17391 7ff615a214a5 17389->17391 17393 7ff615a214f1 17390->17393 17394 7ff615a214d1 17390->17394 17392 7ff615a22760 53 API calls 17391->17392 17400 7ff615a214bc __std_exception_destroy 17392->17400 17396 7ff615a214f7 17393->17396 17402 7ff615a2150a 17393->17402 17397 7ff615a22760 53 API calls 17394->17397 17395 7ff615a2f36c 74 API calls 17398 7ff615a21584 17395->17398 17405 7ff615a211f0 17396->17405 17397->17400 17398->16397 17400->17395 17401 7ff615a2f6bc _fread_nolock 53 API calls 17401->17402 17402->17400 17402->17401 17403 7ff615a21596 17402->17403 17404 7ff615a22760 53 API calls 17403->17404 17404->17400 17406 7ff615a21248 17405->17406 17443 7ff615a23f1a 17442->17443 17444 7ff615a286b0 2 API calls 17443->17444 17445 7ff615a23f3f 17444->17445 17446 7ff615a2b870 _log10_special 8 API calls 17445->17446 17447 7ff615a23f67 17446->17447 17447->16422 17449 7ff615a2753e 17448->17449 17450 7ff615a21bf0 49 API calls 17449->17450 17453 7ff615a27662 17449->17453 17456 7ff615a275c5 17450->17456 17451 7ff615a2b870 _log10_special 8 API calls 17452 7ff615a27693 17451->17452 17452->16422 17453->17451 17454 7ff615a21bf0 49 API calls 17454->17456 17455 7ff615a23f10 10 API calls 17455->17456 17456->17453 17456->17454 17456->17455 17457 7ff615a286b0 2 API calls 17456->17457 17458 7ff615a27633 CreateDirectoryW 17457->17458 17458->17453 17458->17456 17460 7ff615a215f7 17459->17460 17461 7ff615a215d3 17459->17461 17462 7ff615a23f70 108 API calls 17460->17462 17548 7ff615a21050 17461->17548 17464 7ff615a2160b 17462->17464 17467 7ff615a2163b 17464->17467 17468 7ff615a21613 17464->17468 17471 7ff615a23f70 108 API calls 17467->17471 17470 7ff615a22760 53 API calls 17468->17470 17498 7ff615a2694b 17497->17498 17500 7ff615a26904 17497->17500 17498->16422 17500->17498 17587 7ff615a34250 17500->17587 17502 7ff615a23b51 17501->17502 17503 7ff615a23e90 49 API calls 17502->17503 17504 7ff615a23b8b 17503->17504 17505 7ff615a23e90 49 API calls 17504->17505 17506 7ff615a23b9b 17505->17506 17546 7ff615a21bf0 49 API calls 17545->17546 17547 7ff615a23e24 17546->17547 17547->16422 17549 7ff615a23f70 108 API calls 17548->17549 17550 7ff615a2108b 17549->17550 17551 7ff615a210a8 17550->17551 17552 7ff615a21093 17550->17552 17554 7ff615a2f9f4 73 API calls 17551->17554 17553 7ff615a225f0 53 API calls 17552->17553 17588 7ff615a3425d 17587->17588 17589 7ff615a3428a 17587->17589 17591 7ff615a343f4 _set_fmode 11 API calls 17588->17591 17595 7ff615a34214 17588->17595 17590 7ff615a342ad 17589->17590 17593 7ff615a342c9 17589->17593 17592 7ff615a343f4 _set_fmode 11 API calls 17590->17592 17594 7ff615a34267 17591->17594 17597 7ff615a34178 45 API calls 17593->17597 17595->17500 17666 7ff615a351d8 17665->17666 17667 7ff615a351fe 17666->17667 17670 7ff615a35231 17666->17670 17668 7ff615a343f4 _set_fmode 11 API calls 17667->17668 17669 7ff615a35203 17668->17669 17673 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 17669->17673 17671 7ff615a35237 17670->17671 17672 7ff615a35244 17670->17672 17674 7ff615a343f4 _set_fmode 11 API calls 17671->17674 17684 7ff615a39f38 17672->17684 17676 7ff615a23fc6 17673->17676 17674->17676 17676->16449 17697 7ff615a3f5e8 EnterCriticalSection 17684->17697 18057 7ff615a36c08 18056->18057 18060 7ff615a366e4 18057->18060 18059 7ff615a36c21 18059->16459 18061 7ff615a3672e 18060->18061 18062 7ff615a366ff 18060->18062 18070 7ff615a3477c EnterCriticalSection 18061->18070 18064 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 18062->18064 18066 7ff615a3671f 18064->18066 18066->18059 18072 7ff615a2f163 18071->18072 18074 7ff615a2f191 18071->18074 18073 7ff615a39b24 _invalid_parameter_noinfo 37 API calls 18072->18073 18075 7ff615a2f183 18073->18075 18074->18075 18081 7ff615a3477c EnterCriticalSection 18074->18081 18075->16463 18083 7ff615a286b0 2 API calls 18082->18083 18084 7ff615a281b4 LoadLibraryExW 18083->18084 18085 7ff615a281d3 __std_exception_destroy 18084->18085 18085->16493 18152 7ff615a25b05 18151->18152 18153 7ff615a21bf0 49 API calls 18152->18153 18154 7ff615a25b41 18153->18154 18155 7ff615a25b4a 18154->18155 18156 7ff615a25b6d 18154->18156 18157 7ff615a225f0 53 API calls 18155->18157 18158 7ff615a23fe0 49 API calls 18156->18158 18174 7ff615a25b63 18157->18174 18159 7ff615a25b85 18158->18159 18160 7ff615a25ba3 18159->18160 18162 7ff615a225f0 53 API calls 18159->18162 18163 7ff615a23f10 10 API calls 18160->18163 18161 7ff615a2b870 _log10_special 8 API calls 18164 7ff615a2308e 18161->18164 18162->18160 18165 7ff615a25bad 18163->18165 18164->16533 18182 7ff615a25c80 18164->18182 18166 7ff615a25bbb 18165->18166 18168 7ff615a281a0 3 API calls 18165->18168 18167 7ff615a23fe0 49 API calls 18166->18167 18169 7ff615a25bd4 18167->18169 18168->18166 18174->18161 18321 7ff615a24c80 18182->18321 18184 7ff615a25cba 18323 7ff615a24cac 18321->18323 18322 7ff615a24cb4 18322->18184 18323->18322 18326 7ff615a24e54 18323->18326 18359 7ff615a35db4 18323->18359 18324 7ff615a25017 __std_exception_destroy 18324->18184 18325 7ff615a24180 47 API calls 18325->18326 18326->18324 18326->18325 18439->16536 18441 7ff615a3a460 __CxxCallCatchBlock 45 API calls 18440->18441 18442 7ff615a396f1 18441->18442 18443 7ff615a39814 __CxxCallCatchBlock 45 API calls 18442->18443 18444 7ff615a39711 18443->18444 19253 7ff615a3a2e0 19254 7ff615a3a2e5 19253->19254 19258 7ff615a3a2fa 19253->19258 19259 7ff615a3a300 19254->19259 19260 7ff615a3a34a 19259->19260 19261 7ff615a3a342 19259->19261 19263 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19260->19263 19262 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19261->19262 19262->19260 19264 7ff615a3a357 19263->19264 19265 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19264->19265 19266 7ff615a3a364 19265->19266 19267 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19266->19267 19268 7ff615a3a371 19267->19268 19269 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19268->19269 19270 7ff615a3a37e 19269->19270 19271 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19270->19271 19272 7ff615a3a38b 19271->19272 19273 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19272->19273 19274 7ff615a3a398 19273->19274 19275 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19274->19275 19276 7ff615a3a3a5 19275->19276 19277 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19276->19277 19278 7ff615a3a3b5 19277->19278 19279 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19278->19279 19280 7ff615a3a3c5 19279->19280 19285 7ff615a3a1a4 19280->19285 19299 7ff615a3f5e8 EnterCriticalSection 19285->19299 19674 7ff615a39060 19677 7ff615a38fe4 19674->19677 19684 7ff615a3f5e8 EnterCriticalSection 19677->19684 15622 7ff615a34938 15623 7ff615a3496f 15622->15623 15624 7ff615a34952 15622->15624 15623->15624 15625 7ff615a34982 CreateFileW 15623->15625 15673 7ff615a343d4 15624->15673 15627 7ff615a349b6 15625->15627 15628 7ff615a349ec 15625->15628 15647 7ff615a34a8c GetFileType 15627->15647 15682 7ff615a34f14 15628->15682 15636 7ff615a349cb CloseHandle 15642 7ff615a3496a 15636->15642 15637 7ff615a349e1 CloseHandle 15637->15642 15638 7ff615a34a20 15708 7ff615a34cd4 15638->15708 15639 7ff615a349f5 15703 7ff615a34368 15639->15703 15645 7ff615a349ff 15645->15642 15648 7ff615a34b97 15647->15648 15649 7ff615a34ada 15647->15649 15651 7ff615a34bc1 15648->15651 15652 7ff615a34b9f 15648->15652 15650 7ff615a34b06 GetFileInformationByHandle 15649->15650 15654 7ff615a34e10 21 API calls 15649->15654 15655 7ff615a34b2f 15650->15655 15656 7ff615a34bb2 GetLastError 15650->15656 15653 7ff615a34be4 PeekNamedPipe 15651->15653 15672 7ff615a34b82 15651->15672 15652->15656 15657 7ff615a34ba3 15652->15657 15653->15672 15658 7ff615a34af4 15654->15658 15659 7ff615a34cd4 51 API calls 15655->15659 15661 7ff615a34368 _fread_nolock 11 API calls 15656->15661 15660 7ff615a343f4 _set_fmode 11 API calls 15657->15660 15658->15650 15658->15672 15663 7ff615a34b3a 15659->15663 15660->15672 15661->15672 15725 7ff615a34c34 15663->15725 15667 7ff615a34c34 10 API calls 15668 7ff615a34b59 15667->15668 15669 7ff615a34c34 10 API calls 15668->15669 15670 7ff615a34b6a 15669->15670 15671 7ff615a343f4 _set_fmode 11 API calls 15670->15671 15670->15672 15671->15672 15732 7ff615a2b870 15672->15732 15746 7ff615a3a5d8 GetLastError 15673->15746 15675 7ff615a343dd 15676 7ff615a343f4 15675->15676 15677 7ff615a3a5d8 _set_fmode 11 API calls 15676->15677 15678 7ff615a343fd 15677->15678 15679 7ff615a39bf0 15678->15679 15804 7ff615a39a88 15679->15804 15681 7ff615a39c09 15681->15642 15683 7ff615a34f4a 15682->15683 15684 7ff615a343f4 _set_fmode 11 API calls 15683->15684 15702 7ff615a34fe2 __std_exception_destroy 15683->15702 15686 7ff615a34f5c 15684->15686 15685 7ff615a2b870 _log10_special 8 API calls 15687 7ff615a349f1 15685->15687 15688 7ff615a343f4 _set_fmode 11 API calls 15686->15688 15687->15638 15687->15639 15689 7ff615a34f64 15688->15689 15856 7ff615a37118 15689->15856 15691 7ff615a34f79 15692 7ff615a34f8b 15691->15692 15693 7ff615a34f81 15691->15693 15694 7ff615a343f4 _set_fmode 11 API calls 15692->15694 15695 7ff615a343f4 _set_fmode 11 API calls 15693->15695 15696 7ff615a34f90 15694->15696 15699 7ff615a34f86 15695->15699 15697 7ff615a343f4 _set_fmode 11 API calls 15696->15697 15696->15702 15698 7ff615a34f9a 15697->15698 15700 7ff615a37118 45 API calls 15698->15700 15701 7ff615a34fd4 GetDriveTypeW 15699->15701 15699->15702 15700->15699 15701->15702 15702->15685 15704 7ff615a3a5d8 _set_fmode 11 API calls 15703->15704 15705 7ff615a34375 Concurrency::details::SchedulerProxy::DeleteThis 15704->15705 15706 7ff615a3a5d8 _set_fmode 11 API calls 15705->15706 15707 7ff615a34397 15706->15707 15707->15645 15709 7ff615a34cfc 15708->15709 15717 7ff615a34a2d 15709->15717 15950 7ff615a3ea34 15709->15950 15711 7ff615a34d90 15712 7ff615a3ea34 51 API calls 15711->15712 15711->15717 15713 7ff615a34da3 15712->15713 15714 7ff615a3ea34 51 API calls 15713->15714 15713->15717 15715 7ff615a34db6 15714->15715 15716 7ff615a3ea34 51 API calls 15715->15716 15715->15717 15716->15717 15718 7ff615a34e10 15717->15718 15719 7ff615a34e2a 15718->15719 15720 7ff615a34e61 15719->15720 15721 7ff615a34e3a 15719->15721 15722 7ff615a3e8c8 21 API calls 15720->15722 15723 7ff615a34e4a 15721->15723 15724 7ff615a34368 _fread_nolock 11 API calls 15721->15724 15722->15723 15723->15645 15724->15723 15726 7ff615a34c5d FileTimeToSystemTime 15725->15726 15727 7ff615a34c50 15725->15727 15728 7ff615a34c71 SystemTimeToTzSpecificLocalTime 15726->15728 15729 7ff615a34c58 15726->15729 15727->15726 15727->15729 15728->15729 15730 7ff615a2b870 _log10_special 8 API calls 15729->15730 15731 7ff615a34b49 15730->15731 15731->15667 15733 7ff615a2b879 15732->15733 15734 7ff615a2b884 15733->15734 15735 7ff615a2bc00 IsProcessorFeaturePresent 15733->15735 15734->15636 15734->15637 15736 7ff615a2bc18 15735->15736 15741 7ff615a2bdf8 RtlCaptureContext 15736->15741 15742 7ff615a2be12 RtlLookupFunctionEntry 15741->15742 15743 7ff615a2be28 RtlVirtualUnwind 15742->15743 15744 7ff615a2bc2b 15742->15744 15743->15742 15743->15744 15745 7ff615a2bbc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15744->15745 15747 7ff615a3a619 FlsSetValue 15746->15747 15752 7ff615a3a5fc 15746->15752 15748 7ff615a3a609 SetLastError 15747->15748 15749 7ff615a3a62b 15747->15749 15748->15675 15763 7ff615a3dea8 15749->15763 15752->15747 15752->15748 15754 7ff615a3a658 FlsSetValue 15757 7ff615a3a676 15754->15757 15758 7ff615a3a664 FlsSetValue 15754->15758 15755 7ff615a3a648 FlsSetValue 15756 7ff615a3a651 15755->15756 15770 7ff615a39c58 15756->15770 15776 7ff615a3a204 15757->15776 15758->15756 15768 7ff615a3deb9 _set_fmode 15763->15768 15764 7ff615a3df0a 15767 7ff615a343f4 _set_fmode 10 API calls 15764->15767 15765 7ff615a3deee RtlAllocateHeap 15766 7ff615a3a63a 15765->15766 15765->15768 15766->15754 15766->15755 15767->15766 15768->15764 15768->15765 15781 7ff615a428a0 15768->15781 15771 7ff615a39c5d RtlRestoreThreadPreferredUILanguages 15770->15771 15772 7ff615a39c8c 15770->15772 15771->15772 15773 7ff615a39c78 GetLastError 15771->15773 15772->15748 15774 7ff615a39c85 Concurrency::details::SchedulerProxy::DeleteThis 15773->15774 15775 7ff615a343f4 _set_fmode 9 API calls 15774->15775 15775->15772 15790 7ff615a3a0dc 15776->15790 15784 7ff615a428e0 15781->15784 15789 7ff615a3f5e8 EnterCriticalSection 15784->15789 15802 7ff615a3f5e8 EnterCriticalSection 15790->15802 15805 7ff615a39ab3 15804->15805 15808 7ff615a39b24 15805->15808 15807 7ff615a39ada 15807->15681 15818 7ff615a3986c 15808->15818 15811 7ff615a39b5f 15811->15807 15819 7ff615a39888 GetLastError 15818->15819 15820 7ff615a398c3 15818->15820 15821 7ff615a39898 15819->15821 15820->15811 15824 7ff615a398d8 15820->15824 15831 7ff615a3a6a0 15821->15831 15825 7ff615a3990c 15824->15825 15826 7ff615a398f4 GetLastError SetLastError 15824->15826 15825->15811 15827 7ff615a39c10 IsProcessorFeaturePresent 15825->15827 15826->15825 15828 7ff615a39c23 15827->15828 15848 7ff615a39924 15828->15848 15832 7ff615a3a6da FlsSetValue 15831->15832 15833 7ff615a3a6bf FlsGetValue 15831->15833 15834 7ff615a398b3 SetLastError 15832->15834 15836 7ff615a3a6e7 15832->15836 15833->15834 15835 7ff615a3a6d4 15833->15835 15834->15820 15835->15832 15837 7ff615a3dea8 _set_fmode 11 API calls 15836->15837 15838 7ff615a3a6f6 15837->15838 15839 7ff615a3a714 FlsSetValue 15838->15839 15840 7ff615a3a704 FlsSetValue 15838->15840 15842 7ff615a3a720 FlsSetValue 15839->15842 15843 7ff615a3a732 15839->15843 15841 7ff615a3a70d 15840->15841 15844 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15841->15844 15842->15841 15845 7ff615a3a204 _set_fmode 11 API calls 15843->15845 15844->15834 15846 7ff615a3a73a 15845->15846 15847 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15846->15847 15847->15834 15849 7ff615a3995e _isindst memcpy_s 15848->15849 15850 7ff615a39986 RtlCaptureContext RtlLookupFunctionEntry 15849->15850 15851 7ff615a399f6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15850->15851 15852 7ff615a399c0 RtlVirtualUnwind 15850->15852 15855 7ff615a39a48 _isindst 15851->15855 15852->15851 15853 7ff615a2b870 _log10_special 8 API calls 15854 7ff615a39a67 GetCurrentProcess TerminateProcess 15853->15854 15855->15853 15857 7ff615a37134 15856->15857 15858 7ff615a371a2 15856->15858 15857->15858 15860 7ff615a37139 15857->15860 15893 7ff615a3fad0 15858->15893 15861 7ff615a37151 15860->15861 15862 7ff615a3716e 15860->15862 15868 7ff615a36ee8 GetFullPathNameW 15861->15868 15876 7ff615a36f5c GetFullPathNameW 15862->15876 15867 7ff615a37166 __std_exception_destroy 15867->15691 15869 7ff615a36f0e GetLastError 15868->15869 15870 7ff615a36f24 15868->15870 15871 7ff615a34368 _fread_nolock 11 API calls 15869->15871 15872 7ff615a36f20 15870->15872 15875 7ff615a343f4 _set_fmode 11 API calls 15870->15875 15873 7ff615a36f1b 15871->15873 15872->15867 15874 7ff615a343f4 _set_fmode 11 API calls 15873->15874 15874->15872 15875->15872 15877 7ff615a36f8f GetLastError 15876->15877 15882 7ff615a36fa5 __std_exception_destroy 15876->15882 15878 7ff615a34368 _fread_nolock 11 API calls 15877->15878 15880 7ff615a36f9c 15878->15880 15879 7ff615a36fa1 15884 7ff615a37034 15879->15884 15881 7ff615a343f4 _set_fmode 11 API calls 15880->15881 15881->15879 15882->15879 15883 7ff615a36fff GetFullPathNameW 15882->15883 15883->15877 15883->15879 15885 7ff615a3705d memcpy_s 15884->15885 15889 7ff615a370a8 memcpy_s 15884->15889 15886 7ff615a37091 15885->15886 15885->15889 15890 7ff615a370ca 15885->15890 15887 7ff615a343f4 _set_fmode 11 API calls 15886->15887 15888 7ff615a37096 15887->15888 15891 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 15888->15891 15889->15867 15890->15889 15892 7ff615a343f4 _set_fmode 11 API calls 15890->15892 15891->15889 15892->15888 15896 7ff615a3f8e0 15893->15896 15897 7ff615a3f90b 15896->15897 15898 7ff615a3f922 15896->15898 15901 7ff615a343f4 _set_fmode 11 API calls 15897->15901 15899 7ff615a3f947 15898->15899 15900 7ff615a3f926 15898->15900 15934 7ff615a3e8c8 15899->15934 15922 7ff615a3fa4c 15900->15922 15904 7ff615a3f910 15901->15904 15907 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 15904->15907 15906 7ff615a3f94c 15910 7ff615a3f9f1 15906->15910 15917 7ff615a3f973 15906->15917 15921 7ff615a3f91b __std_exception_destroy 15907->15921 15908 7ff615a3f92f 15909 7ff615a343d4 _fread_nolock 11 API calls 15908->15909 15911 7ff615a3f934 15909->15911 15910->15897 15912 7ff615a3f9f9 15910->15912 15914 7ff615a343f4 _set_fmode 11 API calls 15911->15914 15915 7ff615a36ee8 13 API calls 15912->15915 15913 7ff615a2b870 _log10_special 8 API calls 15916 7ff615a3fa41 15913->15916 15914->15904 15915->15921 15916->15867 15918 7ff615a36f5c 14 API calls 15917->15918 15919 7ff615a3f9b7 15918->15919 15920 7ff615a37034 37 API calls 15919->15920 15919->15921 15920->15921 15921->15913 15923 7ff615a3fa96 15922->15923 15924 7ff615a3fa66 15922->15924 15926 7ff615a3fa81 15923->15926 15927 7ff615a3faa1 GetDriveTypeW 15923->15927 15925 7ff615a343d4 _fread_nolock 11 API calls 15924->15925 15928 7ff615a3fa6b 15925->15928 15930 7ff615a2b870 _log10_special 8 API calls 15926->15930 15927->15926 15929 7ff615a343f4 _set_fmode 11 API calls 15928->15929 15931 7ff615a3fa76 15929->15931 15932 7ff615a3f92b 15930->15932 15933 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 15931->15933 15932->15906 15932->15908 15933->15926 15948 7ff615a497e0 15934->15948 15937 7ff615a3e93c 15939 7ff615a3dea8 _set_fmode 11 API calls 15937->15939 15938 7ff615a3e915 15940 7ff615a2b870 _log10_special 8 API calls 15938->15940 15941 7ff615a3e94b 15939->15941 15942 7ff615a3e9a9 15940->15942 15943 7ff615a3e955 GetCurrentDirectoryW 15941->15943 15944 7ff615a3e964 15941->15944 15942->15906 15943->15944 15945 7ff615a3e969 15943->15945 15946 7ff615a343f4 _set_fmode 11 API calls 15944->15946 15947 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15945->15947 15946->15945 15947->15938 15949 7ff615a3e8fe GetCurrentDirectoryW 15948->15949 15949->15937 15949->15938 15952 7ff615a3ea41 15950->15952 15953 7ff615a3ea65 15950->15953 15951 7ff615a3ea46 15955 7ff615a343f4 _set_fmode 11 API calls 15951->15955 15952->15951 15952->15953 15954 7ff615a3ea9f 15953->15954 15957 7ff615a3eabe 15953->15957 15956 7ff615a343f4 _set_fmode 11 API calls 15954->15956 15958 7ff615a3ea4b 15955->15958 15960 7ff615a3eaa4 15956->15960 15967 7ff615a34178 15957->15967 15959 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 15958->15959 15962 7ff615a3ea56 15959->15962 15963 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 15960->15963 15962->15711 15964 7ff615a3eaaf 15963->15964 15964->15711 15965 7ff615a3f7ec 51 API calls 15966 7ff615a3eacb 15965->15966 15966->15964 15966->15965 15968 7ff615a3419c 15967->15968 15974 7ff615a34197 15967->15974 15968->15974 15975 7ff615a3a460 GetLastError 15968->15975 15974->15966 15976 7ff615a3a4a1 FlsSetValue 15975->15976 15977 7ff615a3a484 FlsGetValue 15975->15977 15979 7ff615a3a4b3 15976->15979 15994 7ff615a3a491 15976->15994 15978 7ff615a3a49b 15977->15978 15977->15994 15978->15976 15981 7ff615a3dea8 _set_fmode 11 API calls 15979->15981 15980 7ff615a3a50d SetLastError 15983 7ff615a3a52d 15980->15983 15984 7ff615a341b7 15980->15984 15982 7ff615a3a4c2 15981->15982 15986 7ff615a3a4e0 FlsSetValue 15982->15986 15987 7ff615a3a4d0 FlsSetValue 15982->15987 16005 7ff615a39814 15983->16005 15997 7ff615a3cc94 15984->15997 15990 7ff615a3a4ec FlsSetValue 15986->15990 15991 7ff615a3a4fe 15986->15991 15989 7ff615a3a4d9 15987->15989 15992 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15989->15992 15990->15989 15993 7ff615a3a204 _set_fmode 11 API calls 15991->15993 15992->15994 15995 7ff615a3a506 15993->15995 15994->15980 15996 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15995->15996 15996->15980 15998 7ff615a3cca9 15997->15998 15999 7ff615a341da 15997->15999 15998->15999 16049 7ff615a42614 15998->16049 16001 7ff615a3cd00 15999->16001 16002 7ff615a3cd28 16001->16002 16003 7ff615a3cd15 16001->16003 16002->15974 16003->16002 16062 7ff615a41960 16003->16062 16014 7ff615a42960 16005->16014 16040 7ff615a42918 16014->16040 16045 7ff615a3f5e8 EnterCriticalSection 16040->16045 16050 7ff615a3a460 __CxxCallCatchBlock 45 API calls 16049->16050 16051 7ff615a42623 16050->16051 16052 7ff615a4266e 16051->16052 16061 7ff615a3f5e8 EnterCriticalSection 16051->16061 16052->15999 16063 7ff615a3a460 __CxxCallCatchBlock 45 API calls 16062->16063 16064 7ff615a41969 16063->16064 19350 7ff615a409c0 19361 7ff615a466f4 19350->19361 19362 7ff615a46701 19361->19362 19363 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19362->19363 19364 7ff615a4671d 19362->19364 19363->19362 19365 7ff615a39c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19364->19365 19366 7ff615a409c9 19364->19366 19365->19364 19367 7ff615a3f5e8 EnterCriticalSection 19366->19367 19378 7ff615a3b830 19389 7ff615a3f5e8 EnterCriticalSection 19378->19389 18445 7ff615a3ec9c 18446 7ff615a3ee8e 18445->18446 18448 7ff615a3ecde _isindst 18445->18448 18447 7ff615a343f4 _set_fmode 11 API calls 18446->18447 18465 7ff615a3ee7e 18447->18465 18448->18446 18451 7ff615a3ed5e _isindst 18448->18451 18449 7ff615a2b870 _log10_special 8 API calls 18450 7ff615a3eea9 18449->18450 18466 7ff615a454a4 18451->18466 18456 7ff615a3eeba 18458 7ff615a39c10 _isindst 17 API calls 18456->18458 18460 7ff615a3eece 18458->18460 18463 7ff615a3edbb 18463->18465 18490 7ff615a454e8 18463->18490 18465->18449 18467 7ff615a3ed7c 18466->18467 18468 7ff615a454b3 18466->18468 18472 7ff615a448a8 18467->18472 18497 7ff615a3f5e8 EnterCriticalSection 18468->18497 18473 7ff615a448b1 18472->18473 18475 7ff615a3ed91 18472->18475 18474 7ff615a343f4 _set_fmode 11 API calls 18473->18474 18476 7ff615a448b6 18474->18476 18475->18456 18478 7ff615a448d8 18475->18478 18477 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18476->18477 18477->18475 18479 7ff615a448e1 18478->18479 18483 7ff615a3eda2 18478->18483 18480 7ff615a343f4 _set_fmode 11 API calls 18479->18480 18481 7ff615a448e6 18480->18481 18482 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18481->18482 18482->18483 18483->18456 18484 7ff615a44908 18483->18484 18485 7ff615a3edb3 18484->18485 18486 7ff615a44911 18484->18486 18485->18456 18485->18463 18487 7ff615a343f4 _set_fmode 11 API calls 18486->18487 18488 7ff615a44916 18487->18488 18489 7ff615a39bf0 _invalid_parameter_noinfo 37 API calls 18488->18489 18489->18485 18498 7ff615a3f5e8 EnterCriticalSection 18490->18498 19422 7ff615a34720 19423 7ff615a3472b 19422->19423 19431 7ff615a3e5b4 19423->19431 19444 7ff615a3f5e8 EnterCriticalSection 19431->19444 19450 7ff615a4a10e 19451 7ff615a4a11d 19450->19451 19452 7ff615a4a127 19450->19452 19454 7ff615a3f648 LeaveCriticalSection 19451->19454 20080 7ff615a4a079 20083 7ff615a34788 LeaveCriticalSection 20080->20083

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 7ff615a21000-7ff615a23536 call 7ff615a2f138 call 7ff615a2f140 call 7ff615a2bb70 call 7ff615a34700 call 7ff615a34794 call 7ff615a233e0 14 7ff615a23538-7ff615a2353f 0->14 15 7ff615a23544-7ff615a23566 call 7ff615a218f0 0->15 16 7ff615a2371a-7ff615a23735 call 7ff615a2b870 14->16 21 7ff615a23736-7ff615a2374c call 7ff615a23f70 15->21 22 7ff615a2356c-7ff615a23583 call 7ff615a21bf0 15->22 27 7ff615a2374e-7ff615a2377b call 7ff615a276a0 21->27 28 7ff615a23785-7ff615a2379a call 7ff615a225f0 21->28 26 7ff615a23588-7ff615a235c1 22->26 29 7ff615a235c7-7ff615a235cb 26->29 30 7ff615a23653-7ff615a2366d call 7ff615a27e10 26->30 45 7ff615a2377d-7ff615a23780 call 7ff615a2f36c 27->45 46 7ff615a2379f-7ff615a237be call 7ff615a21bf0 27->46 41 7ff615a23712 28->41 33 7ff615a23638-7ff615a2364d call 7ff615a218e0 29->33 34 7ff615a235cd-7ff615a235e5 call 7ff615a34560 29->34 43 7ff615a2366f-7ff615a23675 30->43 44 7ff615a23695-7ff615a2369c 30->44 33->29 33->30 48 7ff615a235e7-7ff615a235eb 34->48 49 7ff615a235f2-7ff615a2360a call 7ff615a34560 34->49 41->16 50 7ff615a23677-7ff615a23680 43->50 51 7ff615a23682-7ff615a23690 call 7ff615a3415c 43->51 53 7ff615a236a2-7ff615a236c0 call 7ff615a27e10 call 7ff615a27f80 44->53 54 7ff615a23844-7ff615a23863 call 7ff615a23e90 44->54 45->28 61 7ff615a237c1-7ff615a237ca 46->61 48->49 66 7ff615a23617-7ff615a2362f call 7ff615a34560 49->66 67 7ff615a2360c-7ff615a23610 49->67 50->51 51->44 79 7ff615a236c6-7ff615a236c9 53->79 80 7ff615a2380f-7ff615a2381e call 7ff615a28400 53->80 69 7ff615a23871-7ff615a23882 call 7ff615a21bf0 54->69 70 7ff615a23865-7ff615a2386f call 7ff615a23fe0 54->70 61->61 65 7ff615a237cc-7ff615a237e9 call 7ff615a218f0 61->65 65->26 83 7ff615a237ef-7ff615a23800 call 7ff615a225f0 65->83 66->33 84 7ff615a23631 66->84 67->66 76 7ff615a23887-7ff615a238a1 call 7ff615a286b0 69->76 70->76 93 7ff615a238af-7ff615a238c1 SetDllDirectoryW 76->93 94 7ff615a238a3 76->94 79->80 85 7ff615a236cf-7ff615a236f6 call 7ff615a21bf0 79->85 91 7ff615a2382c-7ff615a2382f call 7ff615a27c40 80->91 92 7ff615a23820 80->92 83->41 84->33 100 7ff615a236fc-7ff615a23703 call 7ff615a225f0 85->100 101 7ff615a23805-7ff615a2380d call 7ff615a3415c 85->101 103 7ff615a23834-7ff615a23836 91->103 92->91 98 7ff615a238d0-7ff615a238ec call 7ff615a26560 call 7ff615a26b00 93->98 99 7ff615a238c3-7ff615a238ca 93->99 94->93 118 7ff615a23947-7ff615a2394a call 7ff615a26510 98->118 119 7ff615a238ee-7ff615a238f4 98->119 99->98 104 7ff615a23a50-7ff615a23a58 99->104 107 7ff615a23708-7ff615a2370a 100->107 101->76 103->76 110 7ff615a23838 103->110 108 7ff615a23a5a-7ff615a23a77 PostMessageW GetMessageW 104->108 109 7ff615a23a7d-7ff615a23aaf call 7ff615a233d0 call 7ff615a23080 call 7ff615a233a0 call 7ff615a26780 call 7ff615a26510 104->109 107->41 108->109 110->54 127 7ff615a2394f-7ff615a23956 118->127 121 7ff615a238f6-7ff615a23903 call 7ff615a265a0 119->121 122 7ff615a2390e-7ff615a23918 call 7ff615a26970 119->122 121->122 132 7ff615a23905-7ff615a2390c 121->132 134 7ff615a2391a-7ff615a23921 122->134 135 7ff615a23923-7ff615a23931 call 7ff615a26cd0 122->135 127->104 128 7ff615a2395c-7ff615a23966 call 7ff615a230e0 127->128 128->107 141 7ff615a2396c-7ff615a23980 call 7ff615a283e0 128->141 137 7ff615a2393a-7ff615a23942 call 7ff615a22870 call 7ff615a26780 132->137 134->137 135->127 146 7ff615a23933 135->146 137->118 151 7ff615a23982-7ff615a2399f PostMessageW GetMessageW 141->151 152 7ff615a239a5-7ff615a239bb call 7ff615a27f20 call 7ff615a27fc0 141->152 146->137 151->152 156 7ff615a239c0-7ff615a239e8 call 7ff615a26780 call 7ff615a26510 call 7ff615a27ec0 152->156 163 7ff615a239ea-7ff615a23a00 call 7ff615a281f0 call 7ff615a27ec0 156->163 164 7ff615a23a3d-7ff615a23a4b call 7ff615a218a0 156->164 163->164 171 7ff615a23a02-7ff615a23a10 163->171 164->107 172 7ff615a23a31-7ff615a23a38 call 7ff615a22870 171->172 173 7ff615a23a12-7ff615a23a2c call 7ff615a225f0 call 7ff615a218a0 171->173 172->164 173->107
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileModuleName
                                                          • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-runtime-tmpdir
                                                          • API String ID: 514040917-585287483
                                                          • Opcode ID: 98a1407e1212bc01630d5b0d8fce5349cac854e442e4d7151f8ecb5b7dc5412d
                                                          • Instruction ID: 9d1c5aa427aabfb24a793a5885fabce4f7225c3c0af4c8d99338ae2c7c1b221d
                                                          • Opcode Fuzzy Hash: 98a1407e1212bc01630d5b0d8fce5349cac854e442e4d7151f8ecb5b7dc5412d
                                                          • Instruction Fuzzy Hash: 56F18221A8CE8291FB18DB72D5562F9A651AF55FA0F844232DA1DC36F6EF2CED54C300

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 305 7ff615a44f10-7ff615a44f4b call 7ff615a44898 call 7ff615a448a0 call 7ff615a44908 312 7ff615a44f51-7ff615a44f5c call 7ff615a448a8 305->312 313 7ff615a45175-7ff615a451c1 call 7ff615a39c10 call 7ff615a44898 call 7ff615a448a0 call 7ff615a44908 305->313 312->313 318 7ff615a44f62-7ff615a44f6c 312->318 339 7ff615a451c7-7ff615a451d2 call 7ff615a448a8 313->339 340 7ff615a452ff-7ff615a4536d call 7ff615a39c10 call 7ff615a40888 313->340 320 7ff615a44f8e-7ff615a44f92 318->320 321 7ff615a44f6e-7ff615a44f71 318->321 325 7ff615a44f95-7ff615a44f9d 320->325 324 7ff615a44f74-7ff615a44f7f 321->324 328 7ff615a44f8a-7ff615a44f8c 324->328 329 7ff615a44f81-7ff615a44f88 324->329 325->325 326 7ff615a44f9f-7ff615a44fb2 call 7ff615a3c90c 325->326 335 7ff615a44fca-7ff615a44fd6 call 7ff615a39c58 326->335 336 7ff615a44fb4-7ff615a44fb6 call 7ff615a39c58 326->336 328->320 332 7ff615a44fbb-7ff615a44fc9 328->332 329->324 329->328 346 7ff615a44fdd-7ff615a44fe5 335->346 336->332 339->340 348 7ff615a451d8-7ff615a451e3 call 7ff615a448d8 339->348 359 7ff615a4537b-7ff615a4537e 340->359 360 7ff615a4536f-7ff615a45376 340->360 346->346 349 7ff615a44fe7-7ff615a44ff8 call 7ff615a3f784 346->349 348->340 357 7ff615a451e9-7ff615a4520c call 7ff615a39c58 GetTimeZoneInformation 348->357 349->313 358 7ff615a44ffe-7ff615a45054 call 7ff615a497e0 * 4 call 7ff615a44e2c 349->358 376 7ff615a452d4-7ff615a452fe call 7ff615a44890 call 7ff615a44880 call 7ff615a44888 357->376 377 7ff615a45212-7ff615a45233 357->377 417 7ff615a45056-7ff615a4505a 358->417 362 7ff615a45380 359->362 363 7ff615a453b5-7ff615a453c8 call 7ff615a3c90c 359->363 361 7ff615a4540b-7ff615a4540e 360->361 366 7ff615a45383 361->366 367 7ff615a45414-7ff615a4541c call 7ff615a44f10 361->367 362->366 382 7ff615a453ca 363->382 383 7ff615a453d3-7ff615a453ee call 7ff615a40888 363->383 372 7ff615a45388-7ff615a453b4 call 7ff615a39c58 call 7ff615a2b870 366->372 373 7ff615a45383 call 7ff615a4518c 366->373 367->372 373->372 384 7ff615a4523e-7ff615a45245 377->384 385 7ff615a45235-7ff615a4523b 377->385 392 7ff615a453cc-7ff615a453d1 call 7ff615a39c58 382->392 403 7ff615a453f0-7ff615a453f3 383->403 404 7ff615a453f5-7ff615a45407 call 7ff615a39c58 383->404 386 7ff615a45259 384->386 387 7ff615a45247-7ff615a4524f 384->387 385->384 397 7ff615a4525b-7ff615a452cf call 7ff615a497e0 * 4 call 7ff615a41e6c call 7ff615a45424 * 2 386->397 387->386 393 7ff615a45251-7ff615a45257 387->393 392->362 393->397 397->376 403->392 404->361 419 7ff615a4505c 417->419 420 7ff615a45060-7ff615a45064 417->420 419->420 420->417 422 7ff615a45066-7ff615a4508b call 7ff615a35e68 420->422 428 7ff615a4508e-7ff615a45092 422->428 430 7ff615a450a1-7ff615a450a5 428->430 431 7ff615a45094-7ff615a4509f 428->431 430->428 431->430 433 7ff615a450a7-7ff615a450ab 431->433 436 7ff615a450ad-7ff615a450d5 call 7ff615a35e68 433->436 437 7ff615a4512c-7ff615a45130 433->437 445 7ff615a450d7 436->445 446 7ff615a450f3-7ff615a450f7 436->446 438 7ff615a45137-7ff615a45144 437->438 439 7ff615a45132-7ff615a45134 437->439 441 7ff615a45146-7ff615a4515c call 7ff615a44e2c 438->441 442 7ff615a4515f-7ff615a4516e call 7ff615a44890 call 7ff615a44880 438->442 439->438 441->442 442->313 449 7ff615a450da-7ff615a450e1 445->449 446->437 451 7ff615a450f9-7ff615a45117 call 7ff615a35e68 446->451 449->446 452 7ff615a450e3-7ff615a450f1 449->452 457 7ff615a45123-7ff615a4512a 451->457 452->446 452->449 457->437 458 7ff615a45119-7ff615a4511d 457->458 458->437 459 7ff615a4511f 458->459 459->457
                                                          APIs
                                                          • _get_daylight.LIBCMT ref: 00007FF615A44F55
                                                            • Part of subcall function 00007FF615A448A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A448BC
                                                            • Part of subcall function 00007FF615A39C58: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C6E
                                                            • Part of subcall function 00007FF615A39C58: GetLastError.KERNEL32(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C78
                                                            • Part of subcall function 00007FF615A39C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF615A39BEF,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A39C19
                                                            • Part of subcall function 00007FF615A39C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF615A39BEF,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A39C3E
                                                          • _get_daylight.LIBCMT ref: 00007FF615A44F44
                                                            • Part of subcall function 00007FF615A44908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A4491C
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451BA
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451CB
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451DC
                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF615A4541C), ref: 00007FF615A45203
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                                          • API String ID: 1458651798-239921721
                                                          • Opcode ID: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                                          • Instruction ID: d898e1631a2a89432eea7d3e42ac775ccf009769dcaf6f6c091879ddfa03a7c9
                                                          • Opcode Fuzzy Hash: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                                          • Instruction Fuzzy Hash: 3DD1C426E48A424AE720EF66D4511B9A791FF88FA4F484235EA4DC7AA5DF3CEC41C740

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 490 7ff615a45c74-7ff615a45ce7 call 7ff615a459a8 493 7ff615a45ce9-7ff615a45cf2 call 7ff615a343d4 490->493 494 7ff615a45d01-7ff615a45d0b call 7ff615a37830 490->494 499 7ff615a45cf5-7ff615a45cfc call 7ff615a343f4 493->499 500 7ff615a45d26-7ff615a45d8f CreateFileW 494->500 501 7ff615a45d0d-7ff615a45d24 call 7ff615a343d4 call 7ff615a343f4 494->501 516 7ff615a46042-7ff615a46062 499->516 502 7ff615a45e0c-7ff615a45e17 GetFileType 500->502 503 7ff615a45d91-7ff615a45d97 500->503 501->499 509 7ff615a45e19-7ff615a45e54 GetLastError call 7ff615a34368 CloseHandle 502->509 510 7ff615a45e6a-7ff615a45e71 502->510 506 7ff615a45dd9-7ff615a45e07 GetLastError call 7ff615a34368 503->506 507 7ff615a45d99-7ff615a45d9d 503->507 506->499 507->506 514 7ff615a45d9f-7ff615a45dd7 CreateFileW 507->514 509->499 525 7ff615a45e5a-7ff615a45e65 call 7ff615a343f4 509->525 512 7ff615a45e79-7ff615a45e7c 510->512 513 7ff615a45e73-7ff615a45e77 510->513 520 7ff615a45e82-7ff615a45ed7 call 7ff615a37748 512->520 521 7ff615a45e7e 512->521 513->520 514->502 514->506 528 7ff615a45ed9-7ff615a45ee5 call 7ff615a45bb0 520->528 529 7ff615a45ef6-7ff615a45f27 call 7ff615a45728 520->529 521->520 525->499 528->529 537 7ff615a45ee7 528->537 535 7ff615a45f29-7ff615a45f2b 529->535 536 7ff615a45f2d-7ff615a45f6f 529->536 538 7ff615a45ee9-7ff615a45ef1 call 7ff615a39dd0 535->538 539 7ff615a45f91-7ff615a45f9c 536->539 540 7ff615a45f71-7ff615a45f75 536->540 537->538 538->516 542 7ff615a46040 539->542 543 7ff615a45fa2-7ff615a45fa6 539->543 540->539 541 7ff615a45f77-7ff615a45f8c 540->541 541->539 542->516 543->542 545 7ff615a45fac-7ff615a45ff1 CloseHandle CreateFileW 543->545 547 7ff615a46026-7ff615a4603b 545->547 548 7ff615a45ff3-7ff615a46021 GetLastError call 7ff615a34368 call 7ff615a37970 545->548 547->542 548->547
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                          • String ID:
                                                          • API String ID: 1617910340-0
                                                          • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                          • Instruction ID: 95feed0c779c36a7a1ba4d80d35574e93c85faadfbfbd27e0ce93f4ff7b6b122
                                                          • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                          • Instruction Fuzzy Hash: D8C1BF36B28E4586EB50CFA8C4816AC7761FB89FA8B055335DE6E977A4CF38D851C300

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 785 7ff615a4518c-7ff615a451c1 call 7ff615a44898 call 7ff615a448a0 call 7ff615a44908 792 7ff615a451c7-7ff615a451d2 call 7ff615a448a8 785->792 793 7ff615a452ff-7ff615a4536d call 7ff615a39c10 call 7ff615a40888 785->793 792->793 798 7ff615a451d8-7ff615a451e3 call 7ff615a448d8 792->798 805 7ff615a4537b-7ff615a4537e 793->805 806 7ff615a4536f-7ff615a45376 793->806 798->793 804 7ff615a451e9-7ff615a4520c call 7ff615a39c58 GetTimeZoneInformation 798->804 819 7ff615a452d4-7ff615a452fe call 7ff615a44890 call 7ff615a44880 call 7ff615a44888 804->819 820 7ff615a45212-7ff615a45233 804->820 808 7ff615a45380 805->808 809 7ff615a453b5-7ff615a453c8 call 7ff615a3c90c 805->809 807 7ff615a4540b-7ff615a4540e 806->807 811 7ff615a45383 807->811 812 7ff615a45414-7ff615a4541c call 7ff615a44f10 807->812 808->811 824 7ff615a453ca 809->824 825 7ff615a453d3-7ff615a453ee call 7ff615a40888 809->825 815 7ff615a45388-7ff615a453b4 call 7ff615a39c58 call 7ff615a2b870 811->815 816 7ff615a45383 call 7ff615a4518c 811->816 812->815 816->815 826 7ff615a4523e-7ff615a45245 820->826 827 7ff615a45235-7ff615a4523b 820->827 833 7ff615a453cc-7ff615a453d1 call 7ff615a39c58 824->833 842 7ff615a453f0-7ff615a453f3 825->842 843 7ff615a453f5-7ff615a45407 call 7ff615a39c58 825->843 828 7ff615a45259 826->828 829 7ff615a45247-7ff615a4524f 826->829 827->826 837 7ff615a4525b-7ff615a452cf call 7ff615a497e0 * 4 call 7ff615a41e6c call 7ff615a45424 * 2 828->837 829->828 834 7ff615a45251-7ff615a45257 829->834 833->808 834->837 837->819 842->833 843->807
                                                          APIs
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451BA
                                                            • Part of subcall function 00007FF615A44908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A4491C
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451CB
                                                            • Part of subcall function 00007FF615A448A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A448BC
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451DC
                                                            • Part of subcall function 00007FF615A448D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A448EC
                                                            • Part of subcall function 00007FF615A39C58: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C6E
                                                            • Part of subcall function 00007FF615A39C58: GetLastError.KERNEL32(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C78
                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF615A4541C), ref: 00007FF615A45203
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _get_daylight_invalid_parameter_noinfo$ErrorInformationLanguagesLastPreferredRestoreThreadTimeZone
                                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                                          • API String ID: 2248164782-239921721
                                                          • Opcode ID: ae64d4b013316384daf219013b3406c3cfe35626df30cbdeb691f729cbc9c9de
                                                          • Instruction ID: a094e3e2b588b8ff431da259cdaffdf9467e5c1ebdd541d45befb227f407a37a
                                                          • Opcode Fuzzy Hash: ae64d4b013316384daf219013b3406c3cfe35626df30cbdeb691f729cbc9c9de
                                                          • Instruction Fuzzy Hash: C6516332A58E8286E750DF65E4915A9A760FF48FA4F484235DA8DC7AA5DF3CE8408740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                          • Instruction ID: c9cafafdc66f99a65d3c69a8019079e40aeb429c65858f50282e42242ab94f87
                                                          • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                          • Instruction Fuzzy Hash: 64F0C822A5CB4686F7608F64B449766B390BF44F38F044335EA6D42AE4CF3CD4588A00

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 179 7ff615a218f0-7ff615a2192b call 7ff615a23f70 182 7ff615a21bc1-7ff615a21be5 call 7ff615a2b870 179->182 183 7ff615a21931-7ff615a21971 call 7ff615a276a0 179->183 188 7ff615a21977-7ff615a21987 call 7ff615a2f9f4 183->188 189 7ff615a21bae-7ff615a21bb1 call 7ff615a2f36c 183->189 194 7ff615a21989-7ff615a2199c call 7ff615a22760 188->194 195 7ff615a219a1-7ff615a219bd call 7ff615a2f6bc 188->195 192 7ff615a21bb6-7ff615a21bbe 189->192 192->182 194->189 200 7ff615a219d7-7ff615a219ec call 7ff615a34154 195->200 201 7ff615a219bf-7ff615a219d2 call 7ff615a22760 195->201 206 7ff615a21a06-7ff615a21a87 call 7ff615a21bf0 * 2 call 7ff615a2f9f4 200->206 207 7ff615a219ee-7ff615a21a01 call 7ff615a22760 200->207 201->189 215 7ff615a21a8c-7ff615a21a9f call 7ff615a34170 206->215 207->189 218 7ff615a21ab9-7ff615a21ad2 call 7ff615a2f6bc 215->218 219 7ff615a21aa1-7ff615a21ab4 call 7ff615a22760 215->219 224 7ff615a21aec-7ff615a21b08 call 7ff615a2f430 218->224 225 7ff615a21ad4-7ff615a21ae7 call 7ff615a22760 218->225 219->189 230 7ff615a21b1b-7ff615a21b29 224->230 231 7ff615a21b0a-7ff615a21b16 call 7ff615a225f0 224->231 225->189 230->189 233 7ff615a21b2f-7ff615a21b3e 230->233 231->189 235 7ff615a21b40-7ff615a21b46 233->235 236 7ff615a21b48-7ff615a21b55 235->236 237 7ff615a21b60-7ff615a21b6f 235->237 238 7ff615a21b71-7ff615a21b7a 236->238 237->237 237->238 239 7ff615a21b7c-7ff615a21b7f 238->239 240 7ff615a21b8f 238->240 239->240 242 7ff615a21b81-7ff615a21b84 239->242 241 7ff615a21b91-7ff615a21bac 240->241 241->189 241->235 242->240 243 7ff615a21b86-7ff615a21b89 242->243 243->240 244 7ff615a21b8b-7ff615a21b8d 243->244 244->241
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _fread_nolock$Message
                                                          • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                          • API String ID: 677216364-3497178890
                                                          • Opcode ID: a6f04debec555d8a18033318380368f2fbad5bddebec4760a8997b65da40e7af
                                                          • Instruction ID: f7a4a0deadb81fe3a89be8279d37a16d76d36532af825da770577c4b51b9e83c
                                                          • Opcode Fuzzy Hash: a6f04debec555d8a18033318380368f2fbad5bddebec4760a8997b65da40e7af
                                                          • Instruction Fuzzy Hash: 5971C635A48E8685EB20CB36E4422B9A3A1FF84FA4F444235D98DC7769EF3CED448700

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 245 7ff615a215c0-7ff615a215d1 246 7ff615a215f7-7ff615a21611 call 7ff615a23f70 245->246 247 7ff615a215d3-7ff615a215dc call 7ff615a21050 245->247 254 7ff615a2163b-7ff615a21655 call 7ff615a23f70 246->254 255 7ff615a21613-7ff615a2163a call 7ff615a22760 246->255 252 7ff615a215ee-7ff615a215f6 247->252 253 7ff615a215de-7ff615a215e9 call 7ff615a225f0 247->253 253->252 261 7ff615a21657-7ff615a2166c call 7ff615a225f0 254->261 262 7ff615a21671-7ff615a21688 call 7ff615a2f9f4 254->262 269 7ff615a217c5-7ff615a217c8 call 7ff615a2f36c 261->269 267 7ff615a216ab-7ff615a216af 262->267 268 7ff615a2168a-7ff615a216a6 call 7ff615a22760 262->268 271 7ff615a216c9-7ff615a216e9 call 7ff615a34170 267->271 272 7ff615a216b1-7ff615a216bd call 7ff615a211f0 267->272 278 7ff615a217bd-7ff615a217c0 call 7ff615a2f36c 268->278 276 7ff615a217cd-7ff615a217df 269->276 282 7ff615a216eb-7ff615a21707 call 7ff615a22760 271->282 283 7ff615a2170c-7ff615a21717 271->283 279 7ff615a216c2-7ff615a216c4 272->279 278->269 279->278 292 7ff615a217b3-7ff615a217b8 282->292 284 7ff615a217a6-7ff615a217ae call 7ff615a3415c 283->284 285 7ff615a2171d-7ff615a21726 283->285 284->292 288 7ff615a21730-7ff615a21752 call 7ff615a2f6bc 285->288 294 7ff615a21785-7ff615a2178c 288->294 295 7ff615a21754-7ff615a2176c call 7ff615a2fdfc 288->295 292->278 297 7ff615a21793-7ff615a2179c call 7ff615a22760 294->297 300 7ff615a2176e-7ff615a21771 295->300 301 7ff615a21775-7ff615a21783 295->301 304 7ff615a217a1 297->304 300->288 303 7ff615a21773 300->303 301->297 303->304 304->284
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                          • API String ID: 2030045667-1550345328
                                                          • Opcode ID: af8b7429004319750d72b952c51bd94534bb30147a7dbef4d2610a6a95fc15fa
                                                          • Instruction ID: 8044ba69abeedbc48344e310307dd9983709b5ff3c1d05428fdda127b8b2418c
                                                          • Opcode Fuzzy Hash: af8b7429004319750d72b952c51bd94534bb30147a7dbef4d2610a6a95fc15fa
                                                          • Instruction Fuzzy Hash: 82519E65B88E4792EA109B26E9421B9A3A1BF44FB4F444331ED1C877B6EF3CF9558700

                                                          Control-flow Graph

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                          • String ID: CreateProcessW$Failed to create child process!
                                                          • API String ID: 2895956056-699529898
                                                          • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                          • Instruction ID: 21e0d8856f46b200aead352495c28527fbee306bae12f0438bdac556f93d849e
                                                          • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                          • Instruction Fuzzy Hash: 6A415F31A48B8682DA60DB64F4452AAF7A1FF84B74F540335E6AD837E5DF7CD8448B40

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 553 7ff615a211f0-7ff615a2124d call 7ff615a2b0a0 556 7ff615a21277-7ff615a2128f call 7ff615a34170 553->556 557 7ff615a2124f-7ff615a21276 call 7ff615a225f0 553->557 562 7ff615a212ad-7ff615a212bd call 7ff615a34170 556->562 563 7ff615a21291-7ff615a212a8 call 7ff615a22760 556->563 569 7ff615a212db-7ff615a212ed 562->569 570 7ff615a212bf-7ff615a212d6 call 7ff615a22760 562->570 568 7ff615a21409-7ff615a2141e call 7ff615a2ad80 call 7ff615a3415c * 2 563->568 585 7ff615a21423-7ff615a2143d 568->585 571 7ff615a212f0-7ff615a21315 call 7ff615a2f6bc 569->571 570->568 579 7ff615a2131b-7ff615a21325 call 7ff615a2f430 571->579 580 7ff615a21401 571->580 579->580 586 7ff615a2132b-7ff615a21337 579->586 580->568 587 7ff615a21340-7ff615a21368 call 7ff615a294e0 586->587 590 7ff615a213e6-7ff615a213fc call 7ff615a225f0 587->590 591 7ff615a2136a-7ff615a2136d 587->591 590->580 592 7ff615a2136f-7ff615a21379 591->592 593 7ff615a213e1 591->593 595 7ff615a2137b-7ff615a21389 call 7ff615a2fdfc 592->595 596 7ff615a213a4-7ff615a213a7 592->596 593->590 602 7ff615a2138e-7ff615a21391 595->602 597 7ff615a213a9-7ff615a213b7 call 7ff615a49140 596->597 598 7ff615a213ba-7ff615a213bf 596->598 597->598 598->587 601 7ff615a213c5-7ff615a213c8 598->601 606 7ff615a213ca-7ff615a213cd 601->606 607 7ff615a213dc-7ff615a213df 601->607 603 7ff615a2139f-7ff615a213a2 602->603 604 7ff615a21393-7ff615a2139d call 7ff615a2f430 602->604 603->590 604->598 604->603 606->590 609 7ff615a213cf-7ff615a213d7 606->609 607->580 609->571
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                          • API String ID: 2030045667-2813020118
                                                          • Opcode ID: 037f3093d73a47c1094b0f469115e0436c81e2300c38a90b229c8b60b32e4b09
                                                          • Instruction ID: a22e92a38c2824d56ef444bfd9ff73625bc3ae78b804c4956e9f44256b7a2129
                                                          • Opcode Fuzzy Hash: 037f3093d73a47c1094b0f469115e0436c81e2300c38a90b229c8b60b32e4b09
                                                          • Instruction Fuzzy Hash: B451D462A48E4241EA649B66A4413BAA291BF44FA4F484335EE4DC7BE5EF3CED01C700

                                                          Control-flow Graph

                                                          APIs
                                                          • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF615A23834), ref: 00007FF615A27CE4
                                                          • CreateDirectoryW.KERNELBASE(?,?,FFFFFFFF,00007FF615A23834), ref: 00007FF615A27D2C
                                                            • Part of subcall function 00007FF615A27E10: GetEnvironmentVariableW.KERNEL32(00007FF615A2365F), ref: 00007FF615A27E47
                                                            • Part of subcall function 00007FF615A27E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF615A27E69
                                                            • Part of subcall function 00007FF615A37548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A37561
                                                            • Part of subcall function 00007FF615A226C0: MessageBoxW.USER32 ref: 00007FF615A22736
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
                                                          • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                                          • API String ID: 740614611-1339014028
                                                          • Opcode ID: e203fb9b2ed022230aea9b70073d79c64569b0fcacf7335b186391ffe1e7d089
                                                          • Instruction ID: be94050d777a4d4a21f6fd4696003296b52779a66f80746dea986d263dfa14e7
                                                          • Opcode Fuzzy Hash: e203fb9b2ed022230aea9b70073d79c64569b0fcacf7335b186391ffe1e7d089
                                                          • Instruction Fuzzy Hash: 1141C211B99E4241EA60EB72A8562F9E691AF45FA4F444331ED0DC77B6EF3CEE048740

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 672 7ff615a3ad6c-7ff615a3ad92 673 7ff615a3adad-7ff615a3adb1 672->673 674 7ff615a3ad94-7ff615a3ada8 call 7ff615a343d4 call 7ff615a343f4 672->674 676 7ff615a3b187-7ff615a3b193 call 7ff615a343d4 call 7ff615a343f4 673->676 677 7ff615a3adb7-7ff615a3adbe 673->677 692 7ff615a3b19e 674->692 694 7ff615a3b199 call 7ff615a39bf0 676->694 677->676 679 7ff615a3adc4-7ff615a3adf2 677->679 679->676 683 7ff615a3adf8-7ff615a3adff 679->683 684 7ff615a3ae18-7ff615a3ae1b 683->684 685 7ff615a3ae01-7ff615a3ae13 call 7ff615a343d4 call 7ff615a343f4 683->685 690 7ff615a3ae21-7ff615a3ae27 684->690 691 7ff615a3b183-7ff615a3b185 684->691 685->694 690->691 696 7ff615a3ae2d-7ff615a3ae30 690->696 695 7ff615a3b1a1-7ff615a3b1b8 691->695 692->695 694->692 696->685 699 7ff615a3ae32-7ff615a3ae57 696->699 701 7ff615a3ae59-7ff615a3ae5b 699->701 702 7ff615a3ae8a-7ff615a3ae91 699->702 705 7ff615a3ae5d-7ff615a3ae64 701->705 706 7ff615a3ae82-7ff615a3ae88 701->706 703 7ff615a3ae66-7ff615a3ae7d call 7ff615a343d4 call 7ff615a343f4 call 7ff615a39bf0 702->703 704 7ff615a3ae93-7ff615a3aebb call 7ff615a3c90c call 7ff615a39c58 * 2 702->704 733 7ff615a3b010 703->733 735 7ff615a3aed8-7ff615a3af03 call 7ff615a3b594 704->735 736 7ff615a3aebd-7ff615a3aed3 call 7ff615a343f4 call 7ff615a343d4 704->736 705->703 705->706 707 7ff615a3af08-7ff615a3af1f 706->707 710 7ff615a3af9a-7ff615a3afa4 call 7ff615a42c2c 707->710 711 7ff615a3af21-7ff615a3af29 707->711 722 7ff615a3afaa-7ff615a3afbf 710->722 723 7ff615a3b02e 710->723 711->710 714 7ff615a3af2b-7ff615a3af2d 711->714 714->710 718 7ff615a3af2f-7ff615a3af45 714->718 718->710 725 7ff615a3af47-7ff615a3af53 718->725 722->723 727 7ff615a3afc1-7ff615a3afd3 GetConsoleMode 722->727 731 7ff615a3b033-7ff615a3b053 ReadFile 723->731 725->710 729 7ff615a3af55-7ff615a3af57 725->729 727->723 732 7ff615a3afd5-7ff615a3afdd 727->732 729->710 734 7ff615a3af59-7ff615a3af71 729->734 737 7ff615a3b059-7ff615a3b061 731->737 738 7ff615a3b14d-7ff615a3b156 GetLastError 731->738 732->731 740 7ff615a3afdf-7ff615a3b001 ReadConsoleW 732->740 743 7ff615a3b013-7ff615a3b01d call 7ff615a39c58 733->743 734->710 744 7ff615a3af73-7ff615a3af7f 734->744 735->707 736->733 737->738 746 7ff615a3b067 737->746 741 7ff615a3b158-7ff615a3b16e call 7ff615a343f4 call 7ff615a343d4 738->741 742 7ff615a3b173-7ff615a3b176 738->742 749 7ff615a3b003 GetLastError 740->749 750 7ff615a3b022-7ff615a3b02c 740->750 741->733 754 7ff615a3b009-7ff615a3b00b call 7ff615a34368 742->754 755 7ff615a3b17c-7ff615a3b17e 742->755 743->695 744->710 753 7ff615a3af81-7ff615a3af83 744->753 747 7ff615a3b06e-7ff615a3b083 746->747 747->743 757 7ff615a3b085-7ff615a3b090 747->757 749->754 750->747 753->710 761 7ff615a3af85-7ff615a3af95 753->761 754->733 755->743 763 7ff615a3b0b7-7ff615a3b0bf 757->763 764 7ff615a3b092-7ff615a3b0ab call 7ff615a3a984 757->764 761->710 768 7ff615a3b13b-7ff615a3b148 call 7ff615a3a7c4 763->768 769 7ff615a3b0c1-7ff615a3b0d3 763->769 772 7ff615a3b0b0-7ff615a3b0b2 764->772 768->772 773 7ff615a3b12e-7ff615a3b136 769->773 774 7ff615a3b0d5 769->774 772->743 773->743 776 7ff615a3b0da-7ff615a3b0e1 774->776 777 7ff615a3b11d-7ff615a3b128 776->777 778 7ff615a3b0e3-7ff615a3b0e7 776->778 777->773 779 7ff615a3b0e9-7ff615a3b0f0 778->779 780 7ff615a3b103 778->780 779->780 781 7ff615a3b0f2-7ff615a3b0f6 779->781 782 7ff615a3b109-7ff615a3b119 780->782 781->780 783 7ff615a3b0f8-7ff615a3b101 781->783 782->776 784 7ff615a3b11b 782->784 783->782 784->773
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: 7e4b6968f21da67f115f2b5899b729ebe27c21aa0167ab1df282e77588440d71
                                                          • Instruction ID: 33264224313a5734f1e0c87458eb5b21de11d44e87ae9996d1b21e6b0ff3bd42
                                                          • Opcode Fuzzy Hash: 7e4b6968f21da67f115f2b5899b729ebe27c21aa0167ab1df282e77588440d71
                                                          • Instruction Fuzzy Hash: 09C1D122A4CF8A91EAA0DB1594442BDB791EF91FA8F154331DA4E837B1CFBCEC558300

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                          • String ID:
                                                          • API String ID: 995526605-0
                                                          • Opcode ID: 62e4819b0c80cd137060bb94e6a3fe70b8e549ab62dcd95e051829f5e08db428
                                                          • Instruction ID: 8e419ae138d69277bb370e5adbc97dfa9dfbcf23099c54d02e17684b2e096992
                                                          • Opcode Fuzzy Hash: 62e4819b0c80cd137060bb94e6a3fe70b8e549ab62dcd95e051829f5e08db428
                                                          • Instruction Fuzzy Hash: E1212D21A4CE4642EB609BB6E44523AE7A1EF85FB4F140335EA6D83AF4DF6CDD458700

                                                          Control-flow Graph

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,00007FF615A23534), ref: 00007FF615A23411
                                                            • Part of subcall function 00007FF615A229E0: GetLastError.KERNEL32(?,?,?,00007FF615A2342E,?,00007FF615A23534), ref: 00007FF615A22A14
                                                            • Part of subcall function 00007FF615A229E0: FormatMessageW.KERNEL32(?,?,?,00007FF615A2342E), ref: 00007FF615A22A7D
                                                            • Part of subcall function 00007FF615A229E0: MessageBoxW.USER32 ref: 00007FF615A22ACF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message$ErrorFileFormatLastModuleName
                                                          • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                          • API String ID: 517058245-2863816727
                                                          • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                          • Instruction ID: 434bb14bfbe818b65a19d164a90e83b2f6ab42f9d93d1c9a3e9892e9ca8fe901
                                                          • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                          • Instruction Fuzzy Hash: FF219511B58E4291FA219B36E8163B9E290BF49FA5F804337E65DC65F5EF2CDD048700

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00007FF615A27B50: GetCurrentProcess.KERNEL32 ref: 00007FF615A27B70
                                                            • Part of subcall function 00007FF615A27B50: OpenProcessToken.ADVAPI32 ref: 00007FF615A27B83
                                                            • Part of subcall function 00007FF615A27B50: GetTokenInformation.KERNELBASE ref: 00007FF615A27BA8
                                                            • Part of subcall function 00007FF615A27B50: GetLastError.KERNEL32 ref: 00007FF615A27BB2
                                                            • Part of subcall function 00007FF615A27B50: GetTokenInformation.KERNELBASE ref: 00007FF615A27BF2
                                                            • Part of subcall function 00007FF615A27B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF615A27C0E
                                                            • Part of subcall function 00007FF615A27B50: CloseHandle.KERNEL32 ref: 00007FF615A27C26
                                                          • LocalFree.KERNEL32(?,00007FF615A23814), ref: 00007FF615A2848C
                                                          • LocalFree.KERNEL32(?,00007FF615A23814), ref: 00007FF615A28495
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                          • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                                          • API String ID: 6828938-1529539262
                                                          • Opcode ID: 66c7400c0f842d66862a6c7a5c7e226ffa5096460946b14aa4108adf3e2753a4
                                                          • Instruction ID: 7b5cf6fa5f92dc4fd0008c22c3e10c592ddc2a631b3f09ecfdba447d433c7f61
                                                          • Opcode Fuzzy Hash: 66c7400c0f842d66862a6c7a5c7e226ffa5096460946b14aa4108adf3e2753a4
                                                          • Instruction Fuzzy Hash: B5212121A48F4682F650AB61E5163F9A6A1FF84FA0F844635EA4DC37A6DF3CDD44C780

                                                          Control-flow Graph

                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(00000000,?,00007FF615A2324C,?,?,00007FF615A23964), ref: 00007FF615A27642
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory
                                                          • String ID: %.*s$%s%c$\
                                                          • API String ID: 4241100979-1685191245
                                                          • Opcode ID: 2c89eec29aeb9772413d30908ff664029992db9044f6d674e1a207c7a7cb4ecf
                                                          • Instruction ID: 17574696a9398ab5107095a1c6b0caa85406194f44ab9c6295fc76f5612d3c56
                                                          • Opcode Fuzzy Hash: 2c89eec29aeb9772413d30908ff664029992db9044f6d674e1a207c7a7cb4ecf
                                                          • Instruction Fuzzy Hash: D431D621A59EC585EA219B36E4117AAA254FF84FF0F444331EE6D83BE9DF3CDA018700
                                                          APIs
                                                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF615A3C25B), ref: 00007FF615A3C38C
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF615A3C25B), ref: 00007FF615A3C417
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ConsoleErrorLastMode
                                                          • String ID:
                                                          • API String ID: 953036326-0
                                                          • Opcode ID: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                                          • Instruction ID: 04c255fff7bb5eaa6f8043a002e2f83c261623722f9ac037346ea70ff1d52706
                                                          • Opcode Fuzzy Hash: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                                          • Instruction Fuzzy Hash: A891B422E88A5185F790DF66D8542BDABA0BF54FACF144235DE0E97AA5DF3CD8418300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _get_daylight$_isindst
                                                          • String ID:
                                                          • API String ID: 4170891091-0
                                                          • Opcode ID: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
                                                          • Instruction ID: 8194dcb094c018e055558d1bdce0ec2b7ff10f883fbc6cdf647aa4118506b846
                                                          • Opcode Fuzzy Hash: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
                                                          • Instruction Fuzzy Hash: 3451F372F44A529AEB54DF6499456BCA7A1AF00F7CF240335DE1E92AF5DF38AC058700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                          • String ID:
                                                          • API String ID: 2780335769-0
                                                          • Opcode ID: d10f65dc59bbd875d03e086bba487bc4645c30025490cac2eb26a574eddcf909
                                                          • Instruction ID: b2120f59c8ea866e3b3003eaf469c98949765640c21da30300b471ef4337d05d
                                                          • Opcode Fuzzy Hash: d10f65dc59bbd875d03e086bba487bc4645c30025490cac2eb26a574eddcf909
                                                          • Instruction Fuzzy Hash: E2517B26E48B418AFB94CFB1D4543BDA7A1EF48F6CF148635DE09876A8DF38D8818740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 1279662727-0
                                                          • Opcode ID: c9c3dc0ca6ff3025a18f37416ed5252826b5e2a6b8668c561ba6737191909872
                                                          • Instruction ID: ec32103ba5c952ee524e886234061cf783d406dd014e49015af9a18ca01c7717
                                                          • Opcode Fuzzy Hash: c9c3dc0ca6ff3025a18f37416ed5252826b5e2a6b8668c561ba6737191909872
                                                          • Instruction Fuzzy Hash: 4A41A422D58B8243F790CB609504379A260FF94F78F109335E69C83AE5EF7CA9E08700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                          • String ID:
                                                          • API String ID: 3251591375-0
                                                          • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                          • Instruction ID: 7aa536c079c6f0e12130e188430d06e86234429065cb3d558fe177d76107df69
                                                          • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                          • Instruction Fuzzy Hash: 8B315E11ACDE4751FA54A7B6D4633B9A281AF41FA8F440235EA0EC72F3DF6DAD048601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: bcfcf1faf55df9f9e23f958511fce33fc2a490ff62131b022dace26bbec7c8c2
                                                          • Instruction ID: 95063829c713752744a865e34dc590758fa16b86c60a14ed7552f7d9f83d2a1c
                                                          • Opcode Fuzzy Hash: bcfcf1faf55df9f9e23f958511fce33fc2a490ff62131b022dace26bbec7c8c2
                                                          • Instruction Fuzzy Hash: 1251D321B49A8246EA689E37940367AA285EF44FB8F148735DE7D837F5CF3CDC408600
                                                          APIs
                                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF615A39CE5,?,?,00000000,00007FF615A39D9A), ref: 00007FF615A39ED6
                                                          • GetLastError.KERNEL32(?,?,?,00007FF615A39CE5,?,?,00000000,00007FF615A39D9A), ref: 00007FF615A39EE0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ChangeCloseErrorFindLastNotification
                                                          • String ID:
                                                          • API String ID: 1687624791-0
                                                          • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                          • Instruction ID: 1a56008033fd5afdcc743bf0c955a081b0f05bb2f6b41150f8e002ed8d30fcfb
                                                          • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                          • Instruction Fuzzy Hash: 73218E21F5CE8241EED0DB64B480279A6929F84FB8F184335DA2E872E1CF6CAD448201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastPointer
                                                          • String ID:
                                                          • API String ID: 2976181284-0
                                                          • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                          • Instruction ID: d75f48e1f7902ad65a18d41382531fdee14edc3b262ce96aea4a314e825f12d2
                                                          • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                          • Instruction Fuzzy Hash: E911BF61A08F8581DA50CB29B844169A362AF44FF8F584331EE7D87BFACF3CD8508704
                                                          APIs
                                                          • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF615A34B49), ref: 00007FF615A34C67
                                                          • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF615A34B49), ref: 00007FF615A34C7D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Time$System$FileLocalSpecific
                                                          • String ID:
                                                          • API String ID: 1707611234-0
                                                          • Opcode ID: 5814b874014510fcf00941fef2b2171ed045486f006683dc2ae422325307d6da
                                                          • Instruction ID: 5c8d59a54008985b069c9794a0de721ae286cc7fff41ee7c7e313b20caddfb3c
                                                          • Opcode Fuzzy Hash: 5814b874014510fcf00941fef2b2171ed045486f006683dc2ae422325307d6da
                                                          • Instruction Fuzzy Hash: 75114F2164CB5682EAA48B16A41113EF7A0FF85F79F500335EAADC19F8EF2CD854DB00
                                                          APIs
                                                          • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C6E
                                                          • GetLastError.KERNEL32(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C78
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                          • String ID:
                                                          • API String ID: 588628887-0
                                                          • Opcode ID: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                          • Instruction ID: 725cfb9f829c903e3f7e4f354c15345f04d18523e5725bcfd66da20d502a222c
                                                          • Opcode Fuzzy Hash: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                          • Instruction Fuzzy Hash: 74E08C10F8CE8686FF88EBF2A8480B992919F98F25B444230C90DC3272EF3C6C458300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                          • Instruction ID: 590876a32080199f335b1121d6d3b23d611ecf3c7b0230dd48f52509e0b43458
                                                          • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                          • Instruction Fuzzy Hash: EC41B132948A0987EAA4DE55E54127DF7A1EF55FA8F140331D69AC36E0CF3CE802C751
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _fread_nolock
                                                          • String ID:
                                                          • API String ID: 840049012-0
                                                          • Opcode ID: e29fff93704508a3d781caa4d735a753c542fb89e11f4355a6ab92db07b5401f
                                                          • Instruction ID: 6d78ea185521d3de9b6094c55ddecfc632c8d717a6c536fe264105539e34bcc4
                                                          • Opcode Fuzzy Hash: e29fff93704508a3d781caa4d735a753c542fb89e11f4355a6ab92db07b5401f
                                                          • Instruction Fuzzy Hash: 7621B721B88A5145FA149B27A9063FAEA41BF45FE4F8C4530DD0D877A6DF7DE941C700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: 41d876f7d863186cb99ffae5cfc70294694b7844598519de76c307bd1dc1648a
                                                          • Instruction ID: f4842ebe826b19fa881ab012a480bb4b0e587af7cf3f103574c9b0215dc8fdd4
                                                          • Opcode Fuzzy Hash: 41d876f7d863186cb99ffae5cfc70294694b7844598519de76c307bd1dc1648a
                                                          • Instruction Fuzzy Hash: ED319C22E58E6286E691DB5598513BDAA50AF50FB8F450336DA1D833F2CFBCEC518320
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                          • Instruction ID: 13c8e6eff1e1b81120e819abe5e936ae5ce112c6d51b3cc13fb72018a46336a2
                                                          • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                          • Instruction Fuzzy Hash: C9119621A5DE8145EAE0DF95D40117EE3A4AF59FA8F444231EA8CD76A6DF3CDC408740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                          • Instruction ID: 6a3373f6ade36e011149639d26d829bd8690b74f46a64ba711cd3a427cb0b0b7
                                                          • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                          • Instruction Fuzzy Hash: 3B215632658E8186DB618F58D480379F661EF98FA4F184334D69D87AE5DF3CD8008B00
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                          • Instruction ID: 37e1d5030f1a1c2f31f273b8de2d0b2b7f78af5a3279489abf0a7cd75e2731a8
                                                          • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                          • Instruction Fuzzy Hash: 5501A525A48F4241E944DF675902069E699AF55FF0F484731DE6C93BE6DF3CD9028300
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF615A3A63A,?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A), ref: 00007FF615A3DEFD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                          • Instruction ID: 4c87eefaad83f9fad80927af22213462643e1d2995d10e718f516db8f66a134d
                                                          • Opcode Fuzzy Hash: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                          • Instruction Fuzzy Hash: 91F04944B89A47C0FE94D7A658512B5D2906F98FA8F5C4330D90EC62A1DF2CAC898250
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(?,?,?,00007FF615A2FFB0,?,?,?,00007FF615A3161A,?,?,?,?,?,00007FF615A32E09), ref: 00007FF615A3C94A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                          • Instruction ID: 25e08d64fb14db1bbbc15e59e6bbd9c34330ef52f37b16d57ede266a0008b8b5
                                                          • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                          • Instruction Fuzzy Hash: AFF05E00B98A4784FE94D7B29C2127992805F48F78F094330D92EC62E1EF2CAC408110
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AddressProc
                                                          • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                          • API String ID: 190572456-3427451314
                                                          • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                          • Instruction ID: e9dd703e04d9b1959287dffc76a7792dfa3f628e931c7d2c72949f25a48c2eb6
                                                          • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                          • Instruction Fuzzy Hash: 6EE1A864A8EF4391FA55DB95A8511B4A3A9AF44F71F881336C81E863B4EF7CFD48C240
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 808467561-2761157908
                                                          • Opcode ID: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
                                                          • Instruction ID: 26802fc3e47f25bc9c59e2b490efcc61a09ca2214cdcbd86fdacb39807fd7b44
                                                          • Opcode Fuzzy Hash: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
                                                          • Instruction Fuzzy Hash: 3CB22772A48A828BE7648FA4D4407FDB7A1FF54F58F581236DA0D97A94DF38AD40CB40
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,00007FF615A27EF9,00007FF615A239E6), ref: 00007FF615A27A1B
                                                          • RemoveDirectoryW.KERNEL32(?,00007FF615A27EF9,00007FF615A239E6), ref: 00007FF615A27A9E
                                                          • DeleteFileW.KERNEL32(?,00007FF615A27EF9,00007FF615A239E6), ref: 00007FF615A27ABD
                                                          • FindNextFileW.KERNEL32(?,00007FF615A27EF9,00007FF615A239E6), ref: 00007FF615A27ACB
                                                          • FindClose.KERNEL32(?,00007FF615A27EF9,00007FF615A239E6), ref: 00007FF615A27ADC
                                                          • RemoveDirectoryW.KERNEL32(?,00007FF615A27EF9,00007FF615A239E6), ref: 00007FF615A27AE5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                          • String ID: %s\*
                                                          • API String ID: 1057558799-766152087
                                                          • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                          • Instruction ID: 4eab1e063d102975ece63bb15f99a70a936dbc9d97236656692762c444460501
                                                          • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                          • Instruction Fuzzy Hash: 3341A021A8CD4691EE209B75E4455B9A3A1FF94F74F840332D59DC26A4DF3CDF4A8740
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                                          • API String ID: 0-2665694366
                                                          • Opcode ID: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
                                                          • Instruction ID: 61feae95f107c4ab3209ba705712d4ff58750eff66a1513bc608e59e622aee1b
                                                          • Opcode Fuzzy Hash: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
                                                          • Instruction Fuzzy Hash: BD52E372A58AA64BE7548F25C459A7E7BA9FF84F50F014239E64AC3790DFB8DC40CB00
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                          • String ID:
                                                          • API String ID: 3140674995-0
                                                          • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                          • Instruction ID: c173a279c38dc07105e8d6c24a39b461dd8c63c3e287c27101f631fbede77c70
                                                          • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                          • Instruction Fuzzy Hash: E9314D72648F8586EB608FA1E8543EEB360FB84B54F44413ADB4E87BA5DF38D948C710
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message$ErrorFormatLast
                                                          • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error
                                                          • API String ID: 3971115935-1149178304
                                                          • Opcode ID: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
                                                          • Instruction ID: a42c3c80c40711d19c083c40786f8d5eb5c947608415bcba9281e24d37b44105
                                                          • Opcode Fuzzy Hash: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
                                                          • Instruction Fuzzy Hash: 10216572618E8582E7209B51F4416EAB3A4FF88F95F404236EBCD93A68DF3CD546C740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                          • String ID:
                                                          • API String ID: 1239891234-0
                                                          • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                          • Instruction ID: aba8df26f76246d542c0a4a1590807c708f0ba641064d68484cb93579808676d
                                                          • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                          • Instruction Fuzzy Hash: E0315332658F8586DB60CF65E8402AEB3A4FF88F64F540235EA9D83B65DF38C555C700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileFindFirst_invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 2227656907-0
                                                          • Opcode ID: fe4d16d24a501c342f9bdefd2dbf7b3c8df5536519bece05b709b84cd6c1ed58
                                                          • Instruction ID: dfa48fe47f0631860a1a8370912a03aa267097b9bb95b633ee204b50ffe7b3a3
                                                          • Opcode Fuzzy Hash: fe4d16d24a501c342f9bdefd2dbf7b3c8df5536519bece05b709b84cd6c1ed58
                                                          • Instruction Fuzzy Hash: C1B19626B98E9685EA60DBA694005B9E390FF44FF4F485231E95D8BBA5DF3CEC41D300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                          • String ID:
                                                          • API String ID: 2933794660-0
                                                          • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                          • Instruction ID: 120e9363ddf5be7f977df2d70d4e934b09d5ba34da3d3bb6ed05609ead4ecb3f
                                                          • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                          • Instruction Fuzzy Hash: 10112E22B54F058AEB00CFA0E8552B973A4FB59F68F441E31DA6D86BA4DF7CD5548340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: memcpy_s
                                                          • String ID:
                                                          • API String ID: 1502251526-0
                                                          • Opcode ID: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
                                                          • Instruction ID: a7b172a863b510922d16c563f70620f338a5f4efd1b3c16cb36522a487273eef
                                                          • Opcode Fuzzy Hash: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
                                                          • Instruction Fuzzy Hash: A3C1D472B58A8687DB248F99A04466AF791FB94F94F488236DB4A83754DF3DFC41CB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $header crc mismatch$unknown header flags set
                                                          • API String ID: 0-1127688429
                                                          • Opcode ID: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
                                                          • Instruction ID: e7a4b2f8f3fe46274973005eafda414fb650c851412353f119ac49c72a55df38
                                                          • Opcode Fuzzy Hash: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
                                                          • Instruction Fuzzy Hash: 8CF19472A587D54FE7958B26C089A3ABAA9FF44F90F054638DA4D876A0CF38D981C740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise_clrfp
                                                          • String ID:
                                                          • API String ID: 15204871-0
                                                          • Opcode ID: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
                                                          • Instruction ID: d1b832961fc2223d229719e268860e190b7c1ee3b54ac6ae174e5207a45b0cf5
                                                          • Opcode Fuzzy Hash: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
                                                          • Instruction Fuzzy Hash: C5B14A73605B8A8AEB55CF29D84636C7BA0FB44F58F198A21DA5D837B4CF39D852C700
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $
                                                          • API String ID: 0-227171996
                                                          • Opcode ID: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
                                                          • Instruction ID: 8cbd7a11ff7ae72c771f4f2ddbb5239696a5920acd945ec7e1d1275386f99034
                                                          • Opcode Fuzzy Hash: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
                                                          • Instruction Fuzzy Hash: E5E19132A48A4686EBE8CE25C151179A7A0FF45FACF244336DA4E877B4DF29EC51C740
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: incorrect header check$invalid window size
                                                          • API String ID: 0-900081337
                                                          • Opcode ID: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
                                                          • Instruction ID: e0450767f4b509edb521f8706acf4709c3628773d83f7cad1cad3fb63121f791
                                                          • Opcode Fuzzy Hash: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
                                                          • Instruction Fuzzy Hash: B491CB72A58AC54BE7A48F25C459B7E7A99FF44FA0F054239DA4E86790CF78DD40CB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: e+000$gfff
                                                          • API String ID: 0-3030954782
                                                          • Opcode ID: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
                                                          • Instruction ID: b39d8d7247d9d2062012d07ea32ed71d5c9f0ec513575ad030f7c538fc87a8e5
                                                          • Opcode Fuzzy Hash: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
                                                          • Instruction Fuzzy Hash: 26513B62B5CAC586E7A5CE359801769EB91EB44FA8F489331CB58C7AE1CF3DD844C700
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentFeaturePresentProcessProcessor
                                                          • String ID:
                                                          • API String ID: 1010374628-0
                                                          • Opcode ID: a8238ebacfbb29389201daedac3868d1c225100c6328c8ae619a1fe2ce119bc6
                                                          • Instruction ID: aa0c5bf5903d32fc0e22c973f2700f2fc88bb0db82fe5e822a3c3015841d6e36
                                                          • Opcode Fuzzy Hash: a8238ebacfbb29389201daedac3868d1c225100c6328c8ae619a1fe2ce119bc6
                                                          • Instruction Fuzzy Hash: FA02BF22AEDE8644FA94EB569441279A684BF41FB8F584735DDADCA3F1DF3CAC018300
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: gfffffff
                                                          • API String ID: 0-1523873471
                                                          • Opcode ID: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
                                                          • Instruction ID: 36b8955ccca265e6566f34051a07e02a604f69198d325eea273b0ed966b99492
                                                          • Opcode Fuzzy Hash: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
                                                          • Instruction Fuzzy Hash: 6CA13662B48B8586EB61CB2AE4107A9BB90AF51FD8F048232DA4D877A1DF3DD905C701
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID: TMP
                                                          • API String ID: 3215553584-3125297090
                                                          • Opcode ID: dd4bbb8096afc2135879a6e6acc50949ef59d292da7f7bf8111e5166495e4f15
                                                          • Instruction ID: 20369845272754f852fdede7bcb5344fdd1d9447a3014c74db86d47f400fae16
                                                          • Opcode Fuzzy Hash: dd4bbb8096afc2135879a6e6acc50949ef59d292da7f7bf8111e5166495e4f15
                                                          • Instruction Fuzzy Hash: 71516211B88E5641FAE4EB26595157AD691AF44FE8F484634DE0EC77B2EF3CED418200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: HeapProcess
                                                          • String ID:
                                                          • API String ID: 54951025-0
                                                          • Opcode ID: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
                                                          • Instruction ID: 001e4bdf0f44f88620f4776ca7d1bcf1cfd1ad93e9e9c45e2f452d71c6f4c009
                                                          • Opcode Fuzzy Hash: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
                                                          • Instruction Fuzzy Hash: C4B09220E57F8AC2EA082B696C8621462A87F88F20FA88238C54C81330DF2C28A54700
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
                                                          • Instruction ID: 54a8deebcc64f098b8298190c3b950d2578928d367b05d8ff8a9ae0cfefcdb40
                                                          • Opcode Fuzzy Hash: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
                                                          • Instruction Fuzzy Hash: 60D19A22A88E4686EBB8CE29955027DA7A0AF45F6CF244335CE0D876B5DF39EC41C740
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
                                                          • Instruction ID: d570127249cc5f9352ec521f55f7270cbc31c6f30c17f7be9a37c5652980b26b
                                                          • Opcode Fuzzy Hash: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
                                                          • Instruction Fuzzy Hash: 85C1D2722142F24FD288EB29E45997A73D1FB98709BD4402AEB8747F85CE3CE415D790
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
                                                          • Instruction ID: b85cc1594c4c7395e27e057aa2c3ab2a69d3d4a5f49682619beb80fcd2a9ddb2
                                                          • Opcode Fuzzy Hash: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
                                                          • Instruction Fuzzy Hash: A7B15B72948A8585E7A5CF29D45427CBBA0EF46F6CF244236CB4E873A5DF39E841C700
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
                                                          • Instruction ID: 1d5551e62d3914703577ea59246248873769658a5fd19a93995eeeec2945664b
                                                          • Opcode Fuzzy Hash: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
                                                          • Instruction Fuzzy Hash: CD81A472A4CB8186E7B4CF19A441369AA91FF45FE8F144335DA8D83BA5DF3CD9408B40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: d2b2a23e656420a48cffdcfc29ff0550bdd13d7615b538a3eaf25f4462ec28d4
                                                          • Instruction ID: f5ddf05acbfc5ce7abc4f12ff52f23270fea25ff961f33d41e4a3ff291ea7cb1
                                                          • Opcode Fuzzy Hash: d2b2a23e656420a48cffdcfc29ff0550bdd13d7615b538a3eaf25f4462ec28d4
                                                          • Instruction Fuzzy Hash: 6461C822E8CA8286F764CAA8845427DE681AF58F74F584735D69DC6EF5DF7DEC008B00
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                          • Instruction ID: 007cb4dfb4cb4e9668bac0f387e292047ba596b17d756c07258b201909cd32ad
                                                          • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                          • Instruction Fuzzy Hash: 9E516036A58A5182E7A4CB29C040268A3B0EF49F7CF244235CE4D877A4CF7AFC42C780
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                          • Instruction ID: 2a83633483a3abe1b8cba73b5cb9940bb6708b30e7c685bf83a7794cd130b001
                                                          • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                          • Instruction Fuzzy Hash: A2515E76A98A5186E7A4CB29C040229A7A1FF55F7CF244231CA8D977B5CF3AEC43C740
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                          • Instruction ID: 9f861a409c5cd032b8ff75dc7958662a372d6bd1ab78e91d2fcd3db6f4f7a740
                                                          • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                          • Instruction Fuzzy Hash: 32515176A58A5186E7A4CB29C044228A3B1EF49F7CF244231DA4E977A4CF3AFC42C740
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                          • Instruction ID: 678505a34866b24b228a72222c00144fec1ff4491008cbcec82e3fba81ff9355
                                                          • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                          • Instruction Fuzzy Hash: A1516A36A98A5586E7A4CB29C04023CA7A1EF45F6CF244231CE4D977A5CF3AED52C740
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                          • Instruction ID: 583b5c6ee5ec019ed084cd809e903881cb9df88300f2c94df9d2daea9e1d1b4c
                                                          • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                          • Instruction Fuzzy Hash: D3515F36A99A5186E7A4CF29D050229B7A1FF44F6CF244231CA4D977B5DF3AEC42C740
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                          • Instruction ID: 522915dd0b93667993598d80904283ce64964cd3c5b352fb37cf5d52054556e0
                                                          • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                          • Instruction Fuzzy Hash: 8D514076A58A5185E7A5CB29C044228A7B1EF45F6CF244231CE4D977B8CF3AFC52C780
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                          • Instruction ID: fecae39eb82edb0703dd5e4812393575a66e465b75f30d0729fa10fe7e60a2e8
                                                          • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                          • Instruction Fuzzy Hash: 1141B752DC9F8A08E9D5D91C45146B8A7C0AF1BFB8D6853B0DDD9D33E2DF0E6D868140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                          • String ID:
                                                          • API String ID: 588628887-0
                                                          • Opcode ID: 8d7eb27f456b44a91f9c68f162ea9965681a4a0d7ad24d9c24e3bfc258020ebf
                                                          • Instruction ID: baa8981adb8e8eeffb15f8670596e9e1d9b7bdb800aa9087873ed8eec3d0c868
                                                          • Opcode Fuzzy Hash: 8d7eb27f456b44a91f9c68f162ea9965681a4a0d7ad24d9c24e3bfc258020ebf
                                                          • Instruction Fuzzy Hash: 9441E162754E548AEF44CF6AD91456AB3A1BF48FE4B099136EE0DD7B68DF3CC8418300
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d47bd74fb6a019277da3c6b3819bfc69269ba7720235d09fb044e88388ffaf66
                                                          • Instruction ID: 6f62a0870a2f7bf030203d6256d1fb63f6895ab46cf9ebf389d953028eba26c5
                                                          • Opcode Fuzzy Hash: d47bd74fb6a019277da3c6b3819bfc69269ba7720235d09fb044e88388ffaf66
                                                          • Instruction Fuzzy Hash: 4031D632B58F8241EBA4DF25684013EAAD5AF84FA4F144339EB9D93BA5DF3CD9114704
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
                                                          • Instruction ID: be4acf772ae92d7527b0e96b6d86c9dd11a00793be5c927d7ef1839cfce14544
                                                          • Opcode Fuzzy Hash: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
                                                          • Instruction Fuzzy Hash: F1F04FB1A596958EDBA48F2DB812629B7D0FB08B90F808139E689C3A14DB7C94608F04
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
                                                          • Instruction ID: a26d91901e03818c97af7432c370c77ba97513a5adb70b915b5cfced03324e23
                                                          • Opcode Fuzzy Hash: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
                                                          • Instruction Fuzzy Hash: E5A00121998C2AE1EA688BA5E861125B220BF50F20B446231D40D810B0AF3CA8008250
                                                          APIs
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A250C0
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A25101
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A25126
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A2514B
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A25173
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A2519B
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A251C3
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A251EB
                                                          • GetProcAddress.KERNEL32(?,00007FF615A25C57,?,00007FF615A2308E), ref: 00007FF615A25213
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AddressProc
                                                          • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                          • API String ID: 190572456-2007157414
                                                          • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                          • Instruction ID: de39e87eab7f2b758a82ab68803bc3ea607f68d96156b894192e679a9c71da99
                                                          • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                          • Instruction Fuzzy Hash: 3012C460DCEF4391FA159B95E8211B4A3E4BF48F71B981636C84F962B4EF7CBD488241
                                                          APIs
                                                            • Part of subcall function 00007FF615A286B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF615A23FA4,00000000,00007FF615A21925), ref: 00007FF615A286E9
                                                          • ExpandEnvironmentStringsW.KERNEL32(?,00007FF615A27C97,?,?,FFFFFFFF,00007FF615A23834), ref: 00007FF615A2782C
                                                            • Part of subcall function 00007FF615A226C0: MessageBoxW.USER32 ref: 00007FF615A22736
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                          • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                                          • API String ID: 1662231829-930877121
                                                          • Opcode ID: 9eab8ee9825a9fbd44869a095635737d99e10a8ea38952c2113d32bd4c9397e1
                                                          • Instruction ID: 62b29b4f3b1209a6796cad535cf533c80c74cec93a627f28f8fef3b46327229c
                                                          • Opcode Fuzzy Hash: 9eab8ee9825a9fbd44869a095635737d99e10a8ea38952c2113d32bd4c9397e1
                                                          • Instruction Fuzzy Hash: 0241B811B9DE4341FA50EB76D8526BAE751EF84FA4F444231E64EC26B5EF2CED048340
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                          • String ID: P%
                                                          • API String ID: 2147705588-2959514604
                                                          • Opcode ID: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                                          • Instruction ID: e9c747987b85b0afa0ed168aec6bdbe81edfbb2a4b0122591a0c6c942ab87450
                                                          • Opcode Fuzzy Hash: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                                          • Instruction Fuzzy Hash: 9A51E626614BA186DA349F32A4181BAF7A1FB98F71F044221EBDE83694DF3CD485DB10
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID: -$:$f$p$p
                                                          • API String ID: 3215553584-2013873522
                                                          • Opcode ID: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
                                                          • Instruction ID: 10e27c5cb5a6ec71953df4f5f62c186299a0e64deed4c4ef5d7e1a709e1aa7c5
                                                          • Opcode Fuzzy Hash: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
                                                          • Instruction Fuzzy Hash: 81129261E48A4386FBA0DB19E054279E791FF45F78F944236D6C9866E4EF3CED908B00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID: f$f$p$p$f
                                                          • API String ID: 3215553584-1325933183
                                                          • Opcode ID: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
                                                          • Instruction ID: bbe2d5f2da188409fa2d5f76ef4d411c77573e19c64cba7a9d0af14a043690ac
                                                          • Opcode Fuzzy Hash: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
                                                          • Instruction Fuzzy Hash: BF128321E8C94386FBA4DA15E0547BAF651FF90F68F844231E699866E4DF7CED80CB40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                          • API String ID: 2030045667-3659356012
                                                          • Opcode ID: 46cb2396e176c515e5b1b379c4cef78a4cdb7727bbd2a54cd4f09649ba9bae94
                                                          • Instruction ID: 6bdf0ec1ca5633ce4051ee18f72d52e1d1420df51a3c2ef20fbdb4288cb4dd45
                                                          • Opcode Fuzzy Hash: 46cb2396e176c515e5b1b379c4cef78a4cdb7727bbd2a54cd4f09649ba9bae94
                                                          • Instruction Fuzzy Hash: 35419E25B88E4642EA149B63A8421BAE791FF44FE4F444235DD1D87BA5EF3CF8058300
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                          • API String ID: 2030045667-3659356012
                                                          • Opcode ID: df4ad80a251e0c5f0c79bd6923b775d70a5b162c42eaf5c7801165d24b84e2b2
                                                          • Instruction ID: 774d48396f049f332c83feb58827fe55be9e90209898c78f444261bfd75a46e4
                                                          • Opcode Fuzzy Hash: df4ad80a251e0c5f0c79bd6923b775d70a5b162c42eaf5c7801165d24b84e2b2
                                                          • Instruction Fuzzy Hash: D6418225B88A4681EE209B66A9421B6E390FF04FE4F584231DE5D87AB5EF3CFD418700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                          • String ID: csm$csm$csm
                                                          • API String ID: 849930591-393685449
                                                          • Opcode ID: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                                          • Instruction ID: 058a0e1005133d21dac8bf5411d9281846fc2607dbf0ac9240cc41dd2c90c26b
                                                          • Opcode Fuzzy Hash: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                                          • Instruction Fuzzy Hash: 31D14232A48B418AE7109B76D4423BDB7A0FF55FA8F104235DA4D977A6DF38E881C741
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF615A3E3BA,?,?,0000011C08C26A08,00007FF615A3A063,?,?,?,00007FF615A39F5A,?,?,?,00007FF615A3524E), ref: 00007FF615A3E19C
                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF615A3E3BA,?,?,0000011C08C26A08,00007FF615A3A063,?,?,?,00007FF615A39F5A,?,?,?,00007FF615A3524E), ref: 00007FF615A3E1A8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeLibraryProc
                                                          • String ID: api-ms-$ext-ms-
                                                          • API String ID: 3013587201-537541572
                                                          • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                          • Instruction ID: 13f4663a5949b25a25e1b26a15749e830685449452005753b3b553e94c1e60e1
                                                          • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                          • Instruction Fuzzy Hash: 08419E21B99E0286FA96CB16E804675A2D2BF55FB4F494235DE1DCB7A4EF3CEC458200
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF615A2D29A,?,?,?,00007FF615A2CF8C,?,?,?,00007FF615A2CB89), ref: 00007FF615A2D06D
                                                          • GetLastError.KERNEL32(?,?,?,00007FF615A2D29A,?,?,?,00007FF615A2CF8C,?,?,?,00007FF615A2CB89), ref: 00007FF615A2D07B
                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF615A2D29A,?,?,?,00007FF615A2CF8C,?,?,?,00007FF615A2CB89), ref: 00007FF615A2D0A5
                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF615A2D29A,?,?,?,00007FF615A2CF8C,?,?,?,00007FF615A2CB89), ref: 00007FF615A2D113
                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF615A2D29A,?,?,?,00007FF615A2CF8C,?,?,?,00007FF615A2CB89), ref: 00007FF615A2D11F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressErrorFreeLastProc
                                                          • String ID: api-ms-
                                                          • API String ID: 2559590344-2084034818
                                                          • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                          • Instruction ID: 2a6101546ac909ba165be1f02ae3cfcd1118d283ed3545d3a22813830c7b82e2
                                                          • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                          • Instruction Fuzzy Hash: 9E31AD21A9EE4280EE119B67A801675A394FF08FB4F990735DD1E873B5EF3CE8428241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Value$ErrorLast
                                                          • String ID:
                                                          • API String ID: 2506987500-0
                                                          • Opcode ID: 67217a7fc91f5e25160bb9a3b2c8204a3bd01eab0ccbfeeabb81ecf6e12f005c
                                                          • Instruction ID: 6c0aa137bb5d92ddd22130b5b5d98c8005348aa071dbc8921563720bad6aca1a
                                                          • Opcode Fuzzy Hash: 67217a7fc91f5e25160bb9a3b2c8204a3bd01eab0ccbfeeabb81ecf6e12f005c
                                                          • Instruction Fuzzy Hash: 5E213A20F8CA5246FA94E7215665139E1825F48FB8F144734DA3ECBAF6DF7CAC414701
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                          • String ID: CONOUT$
                                                          • API String ID: 3230265001-3130406586
                                                          • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                          • Instruction ID: 48fb29378dcf127555f34a71c966ee7ae2e3fd1bca650c9d26dd0c89ae71a2df
                                                          • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                          • Instruction Fuzzy Hash: DD114F21A58E4686E7508B96A854729A6A0BF88FF4F044334EA5DC77A4DF7CDC048740
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF615A239F2), ref: 00007FF615A2821D
                                                          • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF615A239F2), ref: 00007FF615A2827A
                                                            • Part of subcall function 00007FF615A286B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF615A23FA4,00000000,00007FF615A21925), ref: 00007FF615A286E9
                                                          • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF615A239F2), ref: 00007FF615A28305
                                                          • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF615A239F2), ref: 00007FF615A28364
                                                          • FreeLibrary.KERNEL32(?,00000000,?,00007FF615A239F2), ref: 00007FF615A28375
                                                          • FreeLibrary.KERNEL32(?,00000000,?,00007FF615A239F2), ref: 00007FF615A2838A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                                          • String ID:
                                                          • API String ID: 3462794448-0
                                                          • Opcode ID: 639de59220823cace7c77af6f37b7d772b01f3b75ea0781fa3cc2fa807537d27
                                                          • Instruction ID: c8a6294b68f2ddd2b625f92eb2d8c6da62f2499e67982adbd875a2de4b6ca709
                                                          • Opcode Fuzzy Hash: 639de59220823cace7c77af6f37b7d772b01f3b75ea0781fa3cc2fa807537d27
                                                          • Instruction Fuzzy Hash: 4E41B462A59F8641EA709B22A5012BAB394FF84FE4F444235EF5D977A9DF3CE801C700
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A5E7
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A61D
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A64A
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A65B
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A66C
                                                          • SetLastError.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A687
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Value$ErrorLast
                                                          • String ID:
                                                          • API String ID: 2506987500-0
                                                          • Opcode ID: ef20b32075126869ce53cf62fbcb139ef3f5263cb698c8c2b5617054fce20239
                                                          • Instruction ID: 517795d1abf381fa0427b58fd4b4c4e2e02d04a8ddd00eab3aae9a3bbec5f86a
                                                          • Opcode Fuzzy Hash: ef20b32075126869ce53cf62fbcb139ef3f5263cb698c8c2b5617054fce20239
                                                          • Instruction Fuzzy Hash: 59113820F88E524AFA94E7215661139E2825F88FB8F144734D93ECB6F6DF7CAC414701
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                          • String ID: Unhandled exception in script
                                                          • API String ID: 3081866767-2699770090
                                                          • Opcode ID: 2f02a126994589ece2bf0b221661227d336c2ada993d2ff489732679099e34b6
                                                          • Instruction ID: 9cd35fc2c7cb98cc7c5b20613a41a7063e9d7d73f3ab6e0221932c97c90f6401
                                                          • Opcode Fuzzy Hash: 2f02a126994589ece2bf0b221661227d336c2ada993d2ff489732679099e34b6
                                                          • Instruction Fuzzy Hash: CE316036A58E8689EB60DF61E8552F9A360FF89FA4F440235EA4D87B65DF3CD904C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message$ByteCharMultiWide
                                                          • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
                                                          • API String ID: 1878133881-640379615
                                                          • Opcode ID: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                                          • Instruction ID: 310df8b402aa82528e2a86e6ded866f5d926d4347e1a68295d7909938d244021
                                                          • Opcode Fuzzy Hash: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                                          • Instruction Fuzzy Hash: C5218672668F8581EA20DB61F4517EAA364FF84F94F404236EB8C83A69DF3CDA45C740
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                          • Instruction ID: 996a73f0bfe029ec2f1c2ea4fb0f7b05c248e06a2d52a5cee8b65f6d548034d5
                                                          • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                          • Instruction Fuzzy Hash: 25F06261A59F0681EF108B64E4487799360AF85FB5F581736D66D861F4CF3CD849C310
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _set_statfp
                                                          • String ID:
                                                          • API String ID: 1156100317-0
                                                          • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                          • Instruction ID: 8c00375e6a3182cfdc9756efab3e7f699c90e7ff99eb073456a55613ac92f26e
                                                          • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                          • Instruction Fuzzy Hash: 3411BF32ED8E0341F79411A9F466376D1406F56FB4F1D4734EA6E966F68F2CAC40C110
                                                          APIs
                                                          • FlsGetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A6BF
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A6DE
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A706
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A717
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A728
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Value
                                                          • String ID:
                                                          • API String ID: 3702945584-0
                                                          • Opcode ID: f2276611a630934bbdb354ef1537d91ff3ed6de03a5f5a99dae5237b5b9f36a7
                                                          • Instruction ID: a4c539fbde22c590053b2205852199ef3efebd6fe476f67bc90ee02192f06523
                                                          • Opcode Fuzzy Hash: f2276611a630934bbdb354ef1537d91ff3ed6de03a5f5a99dae5237b5b9f36a7
                                                          • Instruction Fuzzy Hash: 2F116D20F88A5246FAD8D32556A1579E1926F98FB8E044334E93DCA6F6DF7CAC018700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Value
                                                          • String ID:
                                                          • API String ID: 3702945584-0
                                                          • Opcode ID: a5817a23bb51f76ee1afbfff857c957b5c6e4c237a472a6b6273a3da914e048f
                                                          • Instruction ID: 92cec531f6d7df790b3d041e0ecf4a81956bde54c74fa1d275987c3bb3f9c725
                                                          • Opcode Fuzzy Hash: a5817a23bb51f76ee1afbfff857c957b5c6e4c237a472a6b6273a3da914e048f
                                                          • Instruction Fuzzy Hash: D1112A20F88A074AFAD8E7254461579A2815F59F78E144734DA3ECE2F2EF7CBC414201
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID: verbose
                                                          • API String ID: 3215553584-579935070
                                                          • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                          • Instruction ID: 716eed2af6b506121381e72b2eb31df7cf84a962e4998e1cb70cbc8ce63088f2
                                                          • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                          • Instruction Fuzzy Hash: 97919222A48E4645E7A5CE29D45037DB792AF48FA8F844236DADE873E5DF3CEC458340
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                          • API String ID: 3215553584-1196891531
                                                          • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                          • Instruction ID: 6a51c174f0d765dd3309aca0a35bd518829f5ebf650714d9449d9b68928a8dd0
                                                          • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                          • Instruction Fuzzy Hash: D181DA32DA890385FBE4CF29D110279A6A4AF12F6CF558271CA99D72B5EF2DEC018701
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 2395640692-1018135373
                                                          • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                          • Instruction ID: a651c28c34c4b3c13c910fe0a2846c46ba34693f71b5ac7f9daa7015bfd619c3
                                                          • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                          • Instruction Fuzzy Hash: 2351A132B59A42AADB14CB66E465A79B792EF44FA4F108230DA4DC37A4DF7DEC41C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                          • String ID: csm$csm
                                                          • API String ID: 3896166516-3733052814
                                                          • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                          • Instruction ID: 4f69219a8bcea51ed3d2f4fbe79b06a84bf405d859bcef183dd9f661a0255bbb
                                                          • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                          • Instruction Fuzzy Hash: 81517132A48A828AEB648B339045278B691EF55FA4F148335DB5D87BE5CF3CE891C741
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CallEncodePointerTranslator
                                                          • String ID: MOC$RCC
                                                          • API String ID: 3544855599-2084237596
                                                          • Opcode ID: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
                                                          • Instruction ID: fef42459364621923312d35548909ac5f2180daa75eb01cc9eae4747ccb07890
                                                          • Opcode Fuzzy Hash: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
                                                          • Instruction Fuzzy Hash: 59619032908BC585DB219B26E4413AAF7A0FB84FA4F044325EB9D47BA5DF7CE590CB40
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message$ByteCharMultiWide
                                                          • String ID: Error$Error/warning (ANSI fallback)
                                                          • API String ID: 1878133881-653037927
                                                          • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                          • Instruction ID: 51c11ca983d5a56b14860e8cab357bc89f797b0cc5541e78ba16eef8ea252a50
                                                          • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                          • Instruction Fuzzy Hash: 3F116D72668F8581FA208B61F451BA9B364FF48F94F905236EA4D97664DF3CDA09C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message$ByteCharMultiWide
                                                          • String ID: Error/warning (ANSI fallback)$Warning
                                                          • API String ID: 1878133881-2698358428
                                                          • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                          • Instruction ID: 2a019c74239c2c7fd815faa4ea7f23b616daffb490cce48f75354588fd08c458
                                                          • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                          • Instruction Fuzzy Hash: 8B119072668F8981FA208B21F451BA9B364FF44F94F905235DA4C87664CF3CDA04C700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileWrite$ConsoleErrorLastOutput
                                                          • String ID:
                                                          • API String ID: 2718003287-0
                                                          • Opcode ID: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                                          • Instruction ID: 5bb38ad559e3eb652253f41b8c1ba81e8bfe731770c929ba15db7d6376dec092
                                                          • Opcode Fuzzy Hash: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                                          • Instruction Fuzzy Hash: FCD1D172B58A8589E750CF65D4402AC77B2FB48FACB144236CE5E97BA9DF38D916C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$DialogInvalidateRect
                                                          • String ID:
                                                          • API String ID: 1956198572-0
                                                          • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                          • Instruction ID: c4c1b6c395868e1f116d984bb31bcdaa299b045b6f8bbddcc233d43b07bb6ca4
                                                          • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                          • Instruction Fuzzy Hash: 6F11A921E4C94642FA549B7BE5452799291EF88FA0F888231DE4A87BADCF3CDCC18601
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _get_daylight$_invalid_parameter_noinfo
                                                          • String ID: ?
                                                          • API String ID: 1286766494-1684325040
                                                          • Opcode ID: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                                          • Instruction ID: 51ef4fe3176a14be087320c08a13af8fd0cc335049b326a145b0d73c14eefa6b
                                                          • Opcode Fuzzy Hash: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                                          • Instruction Fuzzy Hash: 1941D712A58B8256FB649BA5D4017B9E690EF80FB4F184335EE5D86AF5DF3CD8418700
                                                          APIs
                                                          • _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A3835E
                                                            • Part of subcall function 00007FF615A39C58: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C6E
                                                            • Part of subcall function 00007FF615A39C58: GetLastError.KERNEL32(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C78
                                                          • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF615A2BEC5), ref: 00007FF615A3837C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLanguagesLastModuleNamePreferredRestoreThread_invalid_parameter_noinfo
                                                          • String ID: C:\Users\user\Desktop\Q3pEXxmWAD.exe
                                                          • API String ID: 2553983749-3472980803
                                                          • Opcode ID: ddc46de6380418fe35fca5e4aa859368a8c2113199f78edf785cf6db79d8d493
                                                          • Instruction ID: 46973c9d3421328560b50cd3990179b3cafe2f49f0f89f031e734359ec9c20b8
                                                          • Opcode Fuzzy Hash: ddc46de6380418fe35fca5e4aa859368a8c2113199f78edf785cf6db79d8d493
                                                          • Instruction Fuzzy Hash: 9E418136A49F5789E794DF25A4800BCA395FF45FA8B554235EA4E83BA5DF3CEC818300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory_invalid_parameter_noinfo
                                                          • String ID: .$:
                                                          • API String ID: 2020911589-4202072812
                                                          • Opcode ID: a7e7ecf8ca197d948e5de4d949c192756b769c590a90378fa45037ccdac380fb
                                                          • Instruction ID: 585798f5920ed84ab7eba90bfebe955fa87af950d5bf0fb519b50f26ec400e5e
                                                          • Opcode Fuzzy Hash: a7e7ecf8ca197d948e5de4d949c192756b769c590a90378fa45037ccdac380fb
                                                          • Instruction Fuzzy Hash: 28417F22F58F5298FB80DBB198511BC6AB86F14F6CF540235DE5DA7A65EF3C98458300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastWrite
                                                          • String ID: U
                                                          • API String ID: 442123175-4171548499
                                                          • Opcode ID: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                                          • Instruction ID: 526d8eadfb0341d3e738e54f2dc30820dd1ef88a8bc7d9c7b6ea4c702761ae22
                                                          • Opcode Fuzzy Hash: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                                          • Instruction Fuzzy Hash: 22418322A18B8586DB60CF25E8547A9A761FF98FA4F444131EA4DC7B68DF3CD941CB40
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory
                                                          • String ID: :
                                                          • API String ID: 1611563598-336475711
                                                          • Opcode ID: 07ccd8f192e8e90d69bfd843d23e6c5cb8c086d03a1c4ecf0d47480cab5f9335
                                                          • Instruction ID: 9c0129e4d225e4650168bcad57af644f6667f2ac263b68769772548d71f63256
                                                          • Opcode Fuzzy Hash: 07ccd8f192e8e90d69bfd843d23e6c5cb8c086d03a1c4ecf0d47480cab5f9335
                                                          • Instruction Fuzzy Hash: B121C122B48A8586EFA0DB15D44427EE3A1FF84F98F454235DB8C836A4DF7CED448740
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFileHeaderRaise
                                                          • String ID: csm
                                                          • API String ID: 2573137834-1018135373
                                                          • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                          • Instruction ID: 315a32233af2962c37bdef8c9b6ab589f4bed42b29f502773b9ab69f260a68ca
                                                          • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                          • Instruction Fuzzy Hash: 20113736619B8482EB218B25E440269B7A4FF88F94F184231DB8D47768EF3CC9518B00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.3254239096.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000000.00000002.3254190441.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254354992.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254459349.00007FF615A64000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.3254592956.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DriveType_invalid_parameter_noinfo
                                                          • String ID: :
                                                          • API String ID: 2595371189-336475711
                                                          • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                          • Instruction ID: a99506371614376a98b8d77fdc0a9f5595e4a634051cc9e809542db78b6d4434
                                                          • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                          • Instruction Fuzzy Hash: B1018421D6CA4686FBA0DF60A46127EA790EF48F2CF440236D59DC26A1DF3CD904CA14

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 7ff8b93c1060-7ff8b93c10aa WSAStartup 1 7ff8b93c10b0-7ff8b93c10cb Py_AtExit 0->1 2 7ff8b93c3108-7ff8b93c3110 0->2 3 7ff8b93c10d1-7ff8b93c1159 call 7ff8b93c2f5c VerSetConditionMask * 3 VerifyVersionInfoW 1->3 4 7ff8b93c115f-7ff8b93c1185 PyModule_Create2 1->4 5 7ff8b93c3112-7ff8b93c3115 2->5 6 7ff8b93c3145 2->6 3->4 9 7ff8b93c21a4-7ff8b93c21a6 4->9 10 7ff8b93c118b-7ff8b93c11cf PyModule_AddObject PyErr_NewException 4->10 11 7ff8b93c3117-7ff8b93c311a 5->11 12 7ff8b93c313c-7ff8b93c3143 5->12 7 7ff8b93c314c-7ff8b93c315c PyErr_SetString 6->7 17 7ff8b93c3162-7ff8b93c316b PyErr_NoMemory 7->17 15 7ff8b93c2174-7ff8b93c21a3 call 7ff8b93c2280 9->15 10->9 14 7ff8b93c11d5-7ff8b93c120f PyModule_AddObject PyErr_NewException 10->14 11->6 16 7ff8b93c311c-7ff8b93c3136 PyErr_Format 11->16 12->7 14->9 19 7ff8b93c1215-7ff8b93c1268 PyModule_AddObject PyModule_AddObjectRef PyModule_AddObject 14->19 16->12 17->9 20 7ff8b93c3171 17->20 19->9 22 7ff8b93c126e-7ff8b93c128a PyModule_AddObject 19->22 23 7ff8b93c322a-7ff8b93c3234 _Py_Dealloc 20->23 22->9 24 7ff8b93c1290-7ff8b93c12bb PyModule_AddObject PyMem_Malloc 22->24 23->9 24->17 25 7ff8b93c12c1-7ff8b93c130a PyCapsule_New 24->25 26 7ff8b93c1310-7ff8b93c1325 PyModule_AddObject 25->26 27 7ff8b93c3176-7ff8b93c3181 call 7ff8b93c4b7c 25->27 28 7ff8b93c132b-7ff8b93c203a PyModule_AddIntConstant * 11 PyModule_AddStringConstant * 2 PyModule_AddIntConstant * 137 26->28 29 7ff8b93c318c-7ff8b93c318f 26->29 27->9 36 7ff8b93c3187 27->36 31 7ff8b93c203d-7ff8b93c2048 PyLong_FromUnsignedLong 28->31 33 7ff8b93c3191-7ff8b93c3194 _Py_Dealloc 29->33 34 7ff8b93c319a-7ff8b93c319d 29->34 31->9 35 7ff8b93c204e-7ff8b93c206a PyModule_AddObject 31->35 33->34 34->9 37 7ff8b93c31a3 34->37 35->31 38 7ff8b93c206c-7ff8b93c20cd PyModule_AddIntConstant * 4 PyModule_GetDict 35->38 36->23 37->23 39 7ff8b93c20d3-7ff8b93c214d VerSetConditionMask * 3 38->39 40 7ff8b93c3220-7ff8b93c3224 38->40 41 7ff8b93c2150-7ff8b93c216b VerifyVersionInfoA 39->41 40->9 40->23 42 7ff8b93c2171 41->42 43 7ff8b93c31a8-7ff8b93c31c6 PyUnicode_FromString 41->43 42->15 43->40 44 7ff8b93c31c8-7ff8b93c31e3 _PyDict_Pop 43->44 45 7ff8b93c31e5-7ff8b93c31e8 _Py_Dealloc 44->45 46 7ff8b93c31ee-7ff8b93c31f1 44->46 45->46 46->40 47 7ff8b93c31f3-7ff8b93c31f8 46->47 48 7ff8b93c3203-7ff8b93c3215 47->48 49 7ff8b93c31fa-7ff8b93c31fd _Py_Dealloc 47->49 48->41 50 7ff8b93c321b 48->50 49->48 50->40
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3270094699.00007FF8B93C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                          • Associated: 00000002.00000002.3269996369.00007FF8B93C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270164094.00007FF8B93C8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270292182.00007FF8B93D0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270351890.00007FF8B93D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b93c0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Module_$Constant$Object$ConditionMask$Err_$ExceptionInfoStringVerifyVersion$Capsule_Create2DictExitFormatFromLongLong_MallocMem_StartupUnsigned
                                                          • String ID: 00:00:00:00:00:00$00:00:00:FF:FF:FF$AF_APPLETALK$AF_BLUETOOTH$AF_DECnet$AF_INET$AF_INET6$AF_IPX$AF_IRDA$AF_LINK$AF_SNA$AF_UNSPEC$AI_ADDRCONFIG$AI_ALL$AI_CANONNAME$AI_NUMERICHOST$AI_NUMERICSERV$AI_PASSIVE$AI_V4MAPPED$BDADDR_ANY$BDADDR_LOCAL$BTPROTO_RFCOMM$CAPI$EAI_AGAIN$EAI_BADFLAGS$EAI_FAIL$EAI_FAMILY$EAI_MEMORY$EAI_NODATA$EAI_NONAME$EAI_SERVICE$EAI_SOCKTYPE$INADDR_ALLHOSTS_GROUP$INADDR_ANY$INADDR_BROADCAST$INADDR_LOOPBACK$INADDR_MAX_LOCAL_GROUP$INADDR_NONE$INADDR_UNSPEC_GROUP$IPPORT_RESERVED$IPPORT_USERRESERVED$IPPROTO_AH$IPPROTO_CBT$IPPROTO_DSTOPTS$IPPROTO_EGP$IPPROTO_ESP$IPPROTO_FRAGMENT$IPPROTO_GGP$IPPROTO_HOPOPTS$IPPROTO_ICLFXBM$IPPROTO_ICMP$IPPROTO_ICMPV6$IPPROTO_IDP$IPPROTO_IGMP$IPPROTO_IGP$IPPROTO_IP$IPPROTO_IPV4$IPPROTO_IPV6$IPPROTO_L2TP$IPPROTO_MAX$IPPROTO_ND$IPPROTO_NONE$IPPROTO_PGM$IPPROTO_PIM$IPPROTO_PUP$IPPROTO_RAW$IPPROTO_RDP$IPPROTO_ROUTING$IPPROTO_SCTP$IPPROTO_ST$IPPROTO_TCP$IPPROTO_UDP$IPV6_CHECKSUM$IPV6_DONTFRAG$IPV6_HOPLIMIT$IPV6_HOPOPTS$IPV6_JOIN_GROUP$IPV6_LEAVE_GROUP$IPV6_MULTICAST_HOPS$IPV6_MULTICAST_IF$IPV6_MULTICAST_LOOP$IPV6_PKTINFO$IPV6_RECVRTHDR$IPV6_RECVTCLASS$IPV6_RTHDR$IPV6_TCLASS$IPV6_UNICAST_HOPS$IPV6_V6ONLY$IP_ADD_MEMBERSHIP$IP_DROP_MEMBERSHIP$IP_HDRINCL$IP_MULTICAST_IF$IP_MULTICAST_LOOP$IP_MULTICAST_TTL$IP_OPTIONS$IP_RECVDSTADDR$IP_RECVTOS$IP_TOS$IP_TTL$MSG_BCAST$MSG_CTRUNC$MSG_DONTROUTE$MSG_ERRQUEUE$MSG_MCAST$MSG_OOB$MSG_PEEK$MSG_TRUNC$MSG_WAITALL$NI_DGRAM$NI_MAXHOST$NI_MAXSERV$NI_NAMEREQD$NI_NOFQDN$NI_NUMERICHOST$NI_NUMERICSERV$RCVALL_MAX$RCVALL_OFF$RCVALL_ON$RCVALL_SOCKETLEVELONLY$SHUT_RD$SHUT_RDWR$SHUT_WR$SIO_KEEPALIVE_VALS$SIO_LOOPBACK_FAST_PATH$SIO_RCVALL$SOCK_DGRAM$SOCK_RAW$SOCK_RDM$SOCK_SEQPACKET$SOCK_STREAM$SOL_IP$SOL_SOCKET$SOL_TCP$SOL_UDP$SOMAXCONN$SO_ACCEPTCONN$SO_BROADCAST$SO_DEBUG$SO_DONTROUTE$SO_ERROR$SO_EXCLUSIVEADDRUSE$SO_KEEPALIVE$SO_LINGER$SO_OOBINLINE$SO_RCVBUF$SO_RCVLOWAT$SO_RCVTIMEO$SO_REUSEADDR$SO_SNDBUF$SO_SNDLOWAT$SO_SNDTIMEO$SO_TYPE$SO_USELOOPBACK$SocketType$TCP_FASTOPEN$TCP_KEEPCNT$TCP_KEEPIDLE$TCP_KEEPINTVL$TCP_MAXSEG$TCP_NODELAY$WSAStartup failed: error code %d$WSAStartup failed: network not ready$WSAStartup failed: requested version not supported$_socket.CAPI$error$gaierror$has_ipv6$herror$socket$socket.gaierror$socket.herror$timeout
                                                          • API String ID: 2280847565-1299366327
                                                          • Opcode ID: 1e3798d66d8f3466d25b29997ac536b7de1a01caa9abcf0d10d40263422c2a14
                                                          • Instruction ID: ae16f627e19cbc3690c2be264a5052973d12b2cc12dbaa7f90834eee3916fdfd
                                                          • Opcode Fuzzy Hash: 1e3798d66d8f3466d25b29997ac536b7de1a01caa9abcf0d10d40263422c2a14
                                                          • Instruction Fuzzy Hash: FAA2B568B18FA2A5EA14DF1AE8546662331BB4EBD1F847035CE0E06764DEBDE34DC701

                                                          Control-flow Graph

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3269315418.00007FF8B9061000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                          • Associated: 00000002.00000002.3269250127.00007FF8B9060000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269445450.00007FF8B906B000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269525176.00007FF8B9070000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269619893.00007FF8B9071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b9060000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Module_$Constant$Err_$Exception$Eval_ObjectThread$Create2CriticalDeallocFilenameFromInfoInitializeLibraryLoadRestoreSaveSectionStateSystemVersionWindowsWithgetenv
                                                          • String ID: ABOVE_NORMAL_PRIORITY_CLASS$BELOW_NORMAL_PRIORITY_CLASS$ERROR_ACCESS_DENIED$ERROR_INVALID_NAME$ERROR_PRIVILEGE_NOT_HELD$ERROR_SERVICE_DOES_NOT_EXIST$HIGH_PRIORITY_CLASS$IDLE_PRIORITY_CLASS$INFINITE$MIB_TCP_STATE_CLOSED$MIB_TCP_STATE_CLOSE_WAIT$MIB_TCP_STATE_CLOSING$MIB_TCP_STATE_DELETE_TCB$MIB_TCP_STATE_ESTAB$MIB_TCP_STATE_FIN_WAIT1$MIB_TCP_STATE_FIN_WAIT2$MIB_TCP_STATE_LAST_ACK$MIB_TCP_STATE_LISTEN$MIB_TCP_STATE_SYN_RCVD$MIB_TCP_STATE_SYN_SENT$MIB_TCP_STATE_TIME_WAIT$NORMAL_PRIORITY_CLASS$PSUTIL_CONN_NONE$PSUTIL_DEBUG$REALTIME_PRIORITY_CLASS$TimeoutAbandoned$TimeoutExpired$WINDOWS_10$WINDOWS_7$WINDOWS_8$WINDOWS_8_1$WINDOWS_VISTA$WINVER$_psutil_windows.Error$_psutil_windows.TimeoutAbandoned$_psutil_windows.TimeoutExpired$version
                                                          • API String ID: 887074641-2468274236
                                                          • Opcode ID: 6efccafb7da625c96c85524e3565947ef2e24866e459a4feb39aadcde8a1da25
                                                          • Instruction ID: 04dd81408f408a8b8da893315b3c0f5dbe60be50ffa680de9f3aa1e3c5faf83d
                                                          • Opcode Fuzzy Hash: 6efccafb7da625c96c85524e3565947ef2e24866e459a4feb39aadcde8a1da25
                                                          • Instruction Fuzzy Hash: 7CC1F8A5B1CA8281FE50DF69E9943782762AF4ABD1F804135CB0E477A4DF6DE14BC701

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 454 7ff8b9061e90-7ff8b9061eac PyList_New 455 7ff8b9061eae-7ff8b9061eb6 454->455 456 7ff8b9061eb7-7ff8b9061edd 454->456 457 7ff8b9061edf-7ff8b9061eeb 456->457 458 7ff8b9061f3e-7ff8b9061f44 456->458 463 7ff8b9061fcd-7ff8b9061fe4 malloc 457->463 466 7ff8b9061ef1-7ff8b9061ef3 PyErr_SetFromWindowsErr 457->466 459 7ff8b9061f46-7ff8b9061f9c __acrt_iob_func call 7ff8b9061d70 __acrt_iob_func call 7ff8b9061d70 __acrt_iob_func call 7ff8b9061d70 458->459 460 7ff8b9061fa1-7ff8b9061fab 458->460 459->460 460->463 464 7ff8b9061fad-7ff8b9061fc7 PyErr_SetString 460->464 467 7ff8b9061fe6-7ff8b9061fec PyErr_NoMemory 463->467 468 7ff8b9061ff1-7ff8b906200b NtQuerySystemInformation 463->468 464->463 465 7ff8b9061ef9-7ff8b9061efe 464->465 470 7ff8b9061f09-7ff8b9061f0c 465->470 471 7ff8b9061f00-7ff8b9061f03 _Py_Dealloc 465->471 466->465 467->465 472 7ff8b906200d-7ff8b906201b call 7ff8b9061350 468->472 473 7ff8b9062020-7ff8b9062023 468->473 476 7ff8b9061f0e-7ff8b9061f11 free 470->476 477 7ff8b9061f17-7ff8b9061f3d 470->477 471->470 472->465 478 7ff8b9062029-7ff8b906203d 473->478 479 7ff8b9062146-7ff8b906214f free 473->479 476->477 482 7ff8b9062040-7ff8b906210c Py_BuildValue 478->482 485 7ff8b9062157-7ff8b9062161 479->485 482->465 484 7ff8b9062112-7ff8b9062123 PyList_Append 482->484 484->485 487 7ff8b9062125-7ff8b906212c 484->487 485->465 486 7ff8b9062167-7ff8b9062170 _Py_Dealloc 485->486 486->465 488 7ff8b906212e-7ff8b9062131 _Py_Dealloc 487->488 489 7ff8b9062137-7ff8b9062140 487->489 488->489 489->479 489->482
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3269315418.00007FF8B9061000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                          • Associated: 00000002.00000002.3269250127.00007FF8B9060000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269445450.00007FF8B906B000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269525176.00007FF8B9070000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269619893.00007FF8B9071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b9060000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocErr_FromList_Windowsfree
                                                          • String ID: (ddddd)$GetActiveProcessorCount() not available; using GetSystemInfo()$GetSystemInfo() failed to retrieve CPU count$NtQuerySystemInformation(SystemProcessorPerformanceInformation)$psutil-debug [%s:%d]> $psutil/arch/windows\cpu.c
                                                          • API String ID: 2064544276-4027580629
                                                          • Opcode ID: 3aba73f1beacce3b45a693e18e4e7de515b957251446303ddff290eb5a7b73cd
                                                          • Instruction ID: 7d04343ec31796014f8d7fd1501bf6ee4410470d3e2b7d92c201aeef599d8df9
                                                          • Opcode Fuzzy Hash: 3aba73f1beacce3b45a693e18e4e7de515b957251446303ddff290eb5a7b73cd
                                                          • Instruction Fuzzy Hash: 49717631A18B828AEE56DF3DA450679B3A5AF55BC4B048336EB4F66650EF3CF4478700

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 536 7ff615a21000-7ff615a23536 call 7ff615a2f138 call 7ff615a2f140 call 7ff615a2bb70 call 7ff615a34700 call 7ff615a34794 call 7ff615a233e0 550 7ff615a23538-7ff615a2353f 536->550 551 7ff615a23544-7ff615a23566 call 7ff615a218f0 536->551 553 7ff615a2371a-7ff615a23735 call 7ff615a2b870 550->553 557 7ff615a23736-7ff615a2374c call 7ff615a23f70 551->557 558 7ff615a2356c-7ff615a23583 call 7ff615a21bf0 551->558 563 7ff615a2374e-7ff615a2377b call 7ff615a276a0 557->563 564 7ff615a23785-7ff615a2379a call 7ff615a225f0 557->564 562 7ff615a23588-7ff615a235c1 558->562 565 7ff615a235c7-7ff615a235cb 562->565 566 7ff615a23653-7ff615a2366d call 7ff615a27e10 562->566 578 7ff615a2377d-7ff615a23780 call 7ff615a2f36c 563->578 579 7ff615a2379f-7ff615a237be call 7ff615a21bf0 563->579 580 7ff615a23712 564->580 569 7ff615a23638-7ff615a2364d call 7ff615a218e0 565->569 570 7ff615a235cd-7ff615a235e5 call 7ff615a34560 565->570 582 7ff615a2366f-7ff615a23675 566->582 583 7ff615a23695-7ff615a2369c 566->583 569->565 569->566 585 7ff615a235e7-7ff615a235eb 570->585 586 7ff615a235f2-7ff615a2360a call 7ff615a34560 570->586 578->564 598 7ff615a237c1-7ff615a237ca 579->598 580->553 587 7ff615a23677-7ff615a23680 582->587 588 7ff615a23682-7ff615a23690 call 7ff615a3415c 582->588 589 7ff615a236a2-7ff615a236c0 call 7ff615a27e10 call 7ff615a27f80 583->589 590 7ff615a23844-7ff615a23863 call 7ff615a23e90 583->590 585->586 602 7ff615a23617-7ff615a2362f call 7ff615a34560 586->602 603 7ff615a2360c-7ff615a23610 586->603 587->588 588->583 614 7ff615a236c6-7ff615a236c9 589->614 615 7ff615a2380f-7ff615a2381e call 7ff615a28400 589->615 605 7ff615a23871-7ff615a23882 call 7ff615a21bf0 590->605 606 7ff615a23865-7ff615a2386f call 7ff615a23fe0 590->606 598->598 601 7ff615a237cc-7ff615a237e9 call 7ff615a218f0 598->601 601->562 618 7ff615a237ef-7ff615a23800 call 7ff615a225f0 601->618 602->569 619 7ff615a23631 602->619 603->602 617 7ff615a23887-7ff615a238a1 call 7ff615a286b0 605->617 606->617 614->615 620 7ff615a236cf-7ff615a236f6 call 7ff615a21bf0 614->620 631 7ff615a2382c-7ff615a23836 call 7ff615a27c40 615->631 632 7ff615a23820 615->632 627 7ff615a238af-7ff615a238c1 SetDllDirectoryW 617->627 628 7ff615a238a3 617->628 618->580 619->569 636 7ff615a236fc-7ff615a23703 call 7ff615a225f0 620->636 637 7ff615a23805-7ff615a2380d call 7ff615a3415c 620->637 634 7ff615a238d0-7ff615a238ec call 7ff615a26560 call 7ff615a26b00 627->634 635 7ff615a238c3-7ff615a238ca 627->635 628->627 631->617 645 7ff615a23838 631->645 632->631 654 7ff615a23947-7ff615a2394a call 7ff615a26510 634->654 655 7ff615a238ee-7ff615a238f4 634->655 635->634 639 7ff615a23a50-7ff615a23a58 635->639 648 7ff615a23708-7ff615a2370a 636->648 637->617 643 7ff615a23a5a-7ff615a23a77 PostMessageW GetMessageW 639->643 644 7ff615a23a7d-7ff615a23a88 call 7ff615a233d0 call 7ff615a23080 639->644 643->644 656 7ff615a23a8d-7ff615a23aaf call 7ff615a233a0 call 7ff615a26780 call 7ff615a26510 644->656 645->590 648->580 662 7ff615a2394f-7ff615a23956 654->662 657 7ff615a238f6-7ff615a23903 call 7ff615a265a0 655->657 658 7ff615a2390e-7ff615a23918 call 7ff615a26970 655->658 657->658 672 7ff615a23905-7ff615a2390c 657->672 668 7ff615a2391a-7ff615a23921 658->668 669 7ff615a23923-7ff615a23931 call 7ff615a26cd0 658->669 662->639 667 7ff615a2395c-7ff615a23966 call 7ff615a230e0 662->667 667->648 677 7ff615a2396c-7ff615a23980 call 7ff615a283e0 667->677 674 7ff615a2393a-7ff615a23942 call 7ff615a22870 call 7ff615a26780 668->674 669->662 682 7ff615a23933 669->682 672->674 674->654 687 7ff615a23982-7ff615a2399f PostMessageW GetMessageW 677->687 688 7ff615a239a5-7ff615a239e8 call 7ff615a27f20 call 7ff615a27fc0 call 7ff615a26780 call 7ff615a26510 call 7ff615a27ec0 677->688 682->674 687->688 699 7ff615a239ea-7ff615a23a00 call 7ff615a281f0 call 7ff615a27ec0 688->699 700 7ff615a23a3d-7ff615a23a4b call 7ff615a218a0 688->700 699->700 707 7ff615a23a02-7ff615a23a10 699->707 700->648 708 7ff615a23a31-7ff615a23a38 call 7ff615a22870 707->708 709 7ff615a23a12-7ff615a23a2c call 7ff615a225f0 call 7ff615a218a0 707->709 708->700 709->648
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileModuleName
                                                          • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-runtime-tmpdir
                                                          • API String ID: 514040917-585287483
                                                          • Opcode ID: 9842cbd688bc5711a49d4e0ce16b69d9ca5c4bef69e7965de4c15c2abde6ee8e
                                                          • Instruction ID: 9d1c5aa427aabfb24a793a5885fabce4f7225c3c0af4c8d99338ae2c7c1b221d
                                                          • Opcode Fuzzy Hash: 9842cbd688bc5711a49d4e0ce16b69d9ca5c4bef69e7965de4c15c2abde6ee8e
                                                          • Instruction Fuzzy Hash: 56F18221A8CE8291FB18DB72D5562F9A651AF55FA0F844232DA1DC36F6EF2CED54C300

                                                          Control-flow Graph

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3269315418.00007FF8B9061000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                          • Associated: 00000002.00000002.3269250127.00007FF8B9060000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269445450.00007FF8B906B000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269525176.00007FF8B9070000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269619893.00007FF8B9071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b9060000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$Err_Process__acrt_iob_funcfprintf$FilenameFromOpenTokenWindowsWith$CurrentImpersonateSelfWarn
                                                          • String ID: (originated from %s)$AdjustTokenPrivileges$ImpersonateSelf$LookupPrivilegeValue$OpenProcessToken$SeDebugPrivilege
                                                          • API String ID: 2544101647-3705996988
                                                          • Opcode ID: 7e459fa033e77e746eff1f6157e4fc365d5f228a077588dde54361fef94116c4
                                                          • Instruction ID: 57b5e1875737c0d28fa502aaca78ec54d3da30ab8711f839417b91837acbcc3a
                                                          • Opcode Fuzzy Hash: 7e459fa033e77e746eff1f6157e4fc365d5f228a077588dde54361fef94116c4
                                                          • Instruction Fuzzy Hash: 4F510971A1CBC292EF60DF69E8402A977A4FB447C4F404436EB8E42669DF7CE54AC740

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1012 7ff615a45c74-7ff615a45ce7 call 7ff615a459a8 1015 7ff615a45ce9-7ff615a45cf2 call 7ff615a343d4 1012->1015 1016 7ff615a45d01-7ff615a45d0b call 7ff615a37830 1012->1016 1021 7ff615a45cf5-7ff615a45cfc call 7ff615a343f4 1015->1021 1022 7ff615a45d26-7ff615a45d8f CreateFileW 1016->1022 1023 7ff615a45d0d-7ff615a45d24 call 7ff615a343d4 call 7ff615a343f4 1016->1023 1036 7ff615a46042-7ff615a46062 1021->1036 1026 7ff615a45e0c-7ff615a45e17 GetFileType 1022->1026 1027 7ff615a45d91-7ff615a45d97 1022->1027 1023->1021 1031 7ff615a45e19-7ff615a45e54 GetLastError call 7ff615a34368 CloseHandle 1026->1031 1032 7ff615a45e6a-7ff615a45e71 1026->1032 1028 7ff615a45dd9-7ff615a45e07 GetLastError call 7ff615a34368 1027->1028 1029 7ff615a45d99-7ff615a45d9d 1027->1029 1028->1021 1029->1028 1034 7ff615a45d9f-7ff615a45dd7 CreateFileW 1029->1034 1031->1021 1047 7ff615a45e5a-7ff615a45e65 call 7ff615a343f4 1031->1047 1039 7ff615a45e79-7ff615a45e7c 1032->1039 1040 7ff615a45e73-7ff615a45e77 1032->1040 1034->1026 1034->1028 1044 7ff615a45e82-7ff615a45ed7 call 7ff615a37748 1039->1044 1045 7ff615a45e7e 1039->1045 1040->1044 1050 7ff615a45ed9-7ff615a45ee5 call 7ff615a45bb0 1044->1050 1051 7ff615a45ef6-7ff615a45f27 call 7ff615a45728 1044->1051 1045->1044 1047->1021 1050->1051 1057 7ff615a45ee7 1050->1057 1058 7ff615a45f29-7ff615a45f2b 1051->1058 1059 7ff615a45f2d-7ff615a45f6f 1051->1059 1060 7ff615a45ee9-7ff615a45ef1 call 7ff615a39dd0 1057->1060 1058->1060 1061 7ff615a45f91-7ff615a45f9c 1059->1061 1062 7ff615a45f71-7ff615a45f75 1059->1062 1060->1036 1064 7ff615a46040 1061->1064 1065 7ff615a45fa2-7ff615a45fa6 1061->1065 1062->1061 1063 7ff615a45f77-7ff615a45f8c 1062->1063 1063->1061 1064->1036 1065->1064 1067 7ff615a45fac-7ff615a45ff1 CloseHandle CreateFileW 1065->1067 1069 7ff615a46026-7ff615a4603b 1067->1069 1070 7ff615a45ff3-7ff615a46021 GetLastError call 7ff615a34368 call 7ff615a37970 1067->1070 1069->1064 1070->1069
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                          • String ID:
                                                          • API String ID: 1617910340-0
                                                          • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                          • Instruction ID: 95feed0c779c36a7a1ba4d80d35574e93c85faadfbfbd27e0ce93f4ff7b6b122
                                                          • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                          • Instruction Fuzzy Hash: D8C1BF36B28E4586EB50CFA8C4816AC7761FB89FA8B055335DE6E977A4CF38D851C300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3270094699.00007FF8B93C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                          • Associated: 00000002.00000002.3269996369.00007FF8B93C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270164094.00007FF8B93C8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270292182.00007FF8B93D0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270351890.00007FF8B93D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b93c0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Eval_Thread$AuditErr_FormatRestoreSaveSys_bind
                                                          • String ID: bind$socket.bind
                                                          • API String ID: 1695574521-187351271
                                                          • Opcode ID: d95e10c574bb9151cc7cac422ff355062cc574c072084da3d5b3e385af4c240c
                                                          • Instruction ID: a6c77f7e4d2e2f364d67009a22c86c9f9d44ee88ef83a4baf3e8ee5f0fe42157
                                                          • Opcode Fuzzy Hash: d95e10c574bb9151cc7cac422ff355062cc574c072084da3d5b3e385af4c240c
                                                          • Instruction Fuzzy Hash: BF110322A08FC292E6609F59E8443ABA374FB8CBC0F042532DB8D47B58DF7CE5598740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                          • Instruction ID: c9cafafdc66f99a65d3c69a8019079e40aeb429c65858f50282e42242ab94f87
                                                          • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                          • Instruction Fuzzy Hash: 64F0C822A5CB4686F7608F64B449766B390BF44F38F044335EA6D42AE4CF3CD4588A00
                                                          APIs
                                                          • PyImport_Import.PYTHON311(?,?,?,?,?,?,00000000,?,?,00000000,00007FF8B8AF8A49), ref: 00007FF8B8B01680
                                                          • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,00000000,?,?,00000000,00007FF8B8AF8A49), ref: 00007FF8B8B016A9
                                                          • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,00000000,?,?,00000000,00007FF8B8AF8A49), ref: 00007FF8B8B016EF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267090500.00007FF8B8AF1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF8B8AF0000, based on PE: true
                                                          • Associated: 00000002.00000002.3267030615.00007FF8B8AF0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267162979.00007FF8B8B04000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267222840.00007FF8B8B0A000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267280567.00007FF8B8B0E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8af0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$ImportImport_
                                                          • String ID: <module>
                                                          • API String ID: 2397823689-217463007
                                                          • Opcode ID: 31361185dd40eca64a4d0713cd9bf962043c8a4a799bfca1e9d897335efbc7c7
                                                          • Instruction ID: aae5d4cc9f2cc87d0cc1109ae73ab6f3c16fb3dbdc618f1a7a342ebfae0398c6
                                                          • Opcode Fuzzy Hash: 31361185dd40eca64a4d0713cd9bf962043c8a4a799bfca1e9d897335efbc7c7
                                                          • Instruction Fuzzy Hash: 0FC21665E09B0781EA1AAB7DE88017833A5BF45BC4F485235CB0DA73B5EF3CA4479349

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 388 7ff8b90613d0-7ff8b90613ff PyEval_SaveThread LoadLibraryA PyEval_RestoreThread 389 7ff8b9061401-7ff8b9061410 PyErr_SetFromWindowsErrWithFilename 388->389 390 7ff8b9061412-7ff8b9061425 GetProcAddress 388->390 391 7ff8b906143f-7ff8b9061441 389->391 392 7ff8b9061458-7ff8b906146f GetModuleHandleA 390->392 393 7ff8b9061427-7ff8b9061439 PyErr_SetFromWindowsErrWithFilename FreeLibrary 390->393 394 7ff8b9061448-7ff8b9061457 391->394 395 7ff8b906147a-7ff8b906148d GetProcAddress 392->395 396 7ff8b9061471-7ff8b9061478 392->396 393->391 398 7ff8b906148f 395->398 399 7ff8b90614b7-7ff8b90614ce GetModuleHandleA 395->399 397 7ff8b9061496-7ff8b90614b6 PyErr_SetFromWindowsErrWithFilename 396->397 398->397 400 7ff8b90614d9-7ff8b90614ec GetProcAddress 399->400 401 7ff8b90614d0-7ff8b90614d7 399->401 403 7ff8b90614ee 400->403 404 7ff8b9061516-7ff8b9061542 PyEval_SaveThread LoadLibraryA PyEval_RestoreThread 400->404 402 7ff8b90614f5-7ff8b9061515 PyErr_SetFromWindowsErrWithFilename 401->402 403->402 405 7ff8b906156a-7ff8b906157d GetProcAddress 404->405 406 7ff8b9061544-7ff8b9061569 PyErr_SetFromWindowsErrWithFilename 404->406 407 7ff8b906157f-7ff8b90615af PyErr_SetFromWindowsErrWithFilename FreeLibrary 405->407 408 7ff8b90615b0-7ff8b90615d4 call 7ff8b90612c0 405->408 408->394 411 7ff8b90615da-7ff8b90615f7 call 7ff8b90612c0 408->411 411->394 414 7ff8b90615fd-7ff8b906161a call 7ff8b90612c0 411->414 414->394 417 7ff8b9061620-7ff8b906163d call 7ff8b90612c0 414->417 417->394 420 7ff8b9061643-7ff8b9061660 call 7ff8b90612c0 417->420 420->394 423 7ff8b9061666-7ff8b9061683 call 7ff8b90612c0 420->423 423->394 426 7ff8b9061689-7ff8b90616a6 call 7ff8b90612c0 423->426 426->394 429 7ff8b90616ac-7ff8b90616c9 call 7ff8b90612c0 426->429 429->394 432 7ff8b90616cf-7ff8b90616df GetModuleHandleA 429->432 433 7ff8b90616ea-7ff8b90616fd GetProcAddress 432->433 434 7ff8b90616e1-7ff8b90616e8 432->434 436 7ff8b90616ff 433->436 437 7ff8b9061727-7ff8b906174b call 7ff8b90612c0 433->437 435 7ff8b9061706-7ff8b9061726 PyErr_SetFromWindowsErrWithFilename 434->435 436->435 437->394 440 7ff8b9061751-7ff8b9061761 GetModuleHandleA 437->440 441 7ff8b906176c-7ff8b906177f GetProcAddress 440->441 442 7ff8b9061763-7ff8b906176a 440->442 444 7ff8b9061781 441->444 445 7ff8b9061792-7ff8b90617c1 call 7ff8b90612c0 * 2 441->445 443 7ff8b9061788-7ff8b9061790 PyErr_SetFromWindowsErrWithFilename 442->443 443->445 444->443 449 7ff8b90617c6-7ff8b9061813 call 7ff8b90612c0 * 2 PyErr_Clear 445->449
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3269315418.00007FF8B9061000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                          • Associated: 00000002.00000002.3269250127.00007FF8B9060000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269445450.00007FF8B906B000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269525176.00007FF8B9070000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269619893.00007FF8B9071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b9060000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_FilenameFromWindowsWith$AddressEval_LibraryProcThread$FreeHandleLoadModuleRestoreSave
                                                          • String ID: GetActiveProcessorCount$GetExtendedTcpTable$GetExtendedUdpTable$GetLogicalProcessorInformationEx$GetTickCount64$NtQueryInformationProcess$NtQueryObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtResumeProcess$NtSetInformationProcess$NtSuspendProcess$RtlGetVersion$RtlIpv4AddressToStringA$RtlIpv6AddressToStringA$RtlNtStatusToDosErrorNoTeb$WTSEnumerateSessionsW$WTSFreeMemory$WTSQuerySessionInformationW$iphlpapi.dll$kernel32$ntdll$ntdll.dll$wtsapi32.dll
                                                          • API String ID: 3787047288-761253638
                                                          • Opcode ID: 6b7c78cd98652e75907c508de1284e9f0e804c7fc3037098929c04c6a191e3dd
                                                          • Instruction ID: 211165d999b4e0a84c6b5053004ab9c55a53a722ad7f971c2acf0aa61abc833f
                                                          • Opcode Fuzzy Hash: 6b7c78cd98652e75907c508de1284e9f0e804c7fc3037098929c04c6a191e3dd
                                                          • Instruction Fuzzy Hash: 43C1D2A1A0DB8780EE84DFACF89017933E1AF597D4F849535C60D862A4EF2CE19BC340

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 490 7ff8b93c5008-7ff8b93c5042 491 7ff8b93c5050-7ff8b93c5075 PySys_Audit 490->491 492 7ff8b93c5044-7ff8b93c504e 490->492 494 7ff8b93c5077-7ff8b93c507a 491->494 495 7ff8b93c50cb 491->495 492->491 493 7ff8b93c5090-7ff8b93c509e 492->493 498 7ff8b93c5274-7ff8b93c5284 PyLong_AsLongLong 493->498 499 7ff8b93c50a4-7ff8b93c50ac 493->499 496 7ff8b93c5080-7ff8b93c508a 494->496 497 7ff8b93c534c-7ff8b93c5389 PyEval_SaveThread 494->497 500 7ff8b93c50d0-7ff8b93c50f1 call 7ff8b93c2280 495->500 496->493 496->497 501 7ff8b93c53b6-7ff8b93c53bc socket 497->501 502 7ff8b93c538b-7ff8b93c53a7 WSASocketW 497->502 505 7ff8b93c52b1-7ff8b93c52e0 memset getsockname 498->505 506 7ff8b93c5286-7ff8b93c528f PyErr_Occurred 498->506 503 7ff8b93c50f2-7ff8b93c50fb 499->503 504 7ff8b93c50ae-7ff8b93c50c5 PyErr_Format 499->504 509 7ff8b93c53bf-7ff8b93c53cc PyEval_RestoreThread 501->509 508 7ff8b93c53a9-7ff8b93c53b4 502->508 502->509 512 7ff8b93c5103-7ff8b93c5154 503->512 504->495 513 7ff8b93c52e2-7ff8b93c52e5 505->513 514 7ff8b93c52ee-7ff8b93c52f1 505->514 506->495 510 7ff8b93c5295-7ff8b93c52ac PyErr_SetString 506->510 508->501 515 7ff8b93c53d2-7ff8b93c53dc 509->515 516 7ff8b93c5210-7ff8b93c5215 call 7ff8b93c4008 509->516 510->495 512->512 517 7ff8b93c5156-7ff8b93c51c9 PySys_Audit 512->517 518 7ff8b93c52e7-7ff8b93c52ec 513->518 519 7ff8b93c5308-7ff8b93c530b 513->519 514->516 520 7ff8b93c52f7-7ff8b93c5302 WSAGetLastError 514->520 523 7ff8b93c53e2-7ff8b93c53f4 SetHandleInformation 515->523 524 7ff8b93c522f-7ff8b93c5258 515->524 516->495 517->495 525 7ff8b93c51cf-7ff8b93c520e PyEval_SaveThread WSASocketW PyEval_RestoreThread 517->525 518->519 521 7ff8b93c5345-7ff8b93c5347 519->521 522 7ff8b93c530d-7ff8b93c533b getsockopt 519->522 520->516 520->519 521->524 522->516 528 7ff8b93c5341 522->528 523->524 531 7ff8b93c53fa-7ff8b93c53fc PyErr_SetFromWindowsErr 523->531 529 7ff8b93c525a-7ff8b93c5267 call 7ff8b93c3cc4 524->529 530 7ff8b93c526d-7ff8b93c526f 524->530 525->516 532 7ff8b93c521a-7ff8b93c5228 525->532 528->521 529->530 534 7ff8b93c5402-7ff8b93c540b closesocket 529->534 530->500 531->534 532->524 534->495
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3270094699.00007FF8B93C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                          • Associated: 00000002.00000002.3269996369.00007FF8B93C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270164094.00007FF8B93C8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270292182.00007FF8B93D0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270351890.00007FF8B93D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b93c0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_Eval_Thread$AuditLongRestoreSaveSocketSys_$ErrorFormatFromHandleInformationLastLong_OccurredStringWindowsclosesocketgetsocknamegetsockoptmemsetsocket
                                                          • String ID: Oiii$negative file descriptor$socket descriptor string has wrong size, should be %zu bytes.$socket.__new__
                                                          • API String ID: 3118441216-2881308447
                                                          • Opcode ID: 50bb1b7be01f2dc67f8305606acf70d1fd44bd1c34773e67d9b9e366ba2ac7f7
                                                          • Instruction ID: fab48116999f07edbba9b718073102fe8633cbf064b2a33ecfce598cb94bbed9
                                                          • Opcode Fuzzy Hash: 50bb1b7be01f2dc67f8305606acf70d1fd44bd1c34773e67d9b9e366ba2ac7f7
                                                          • Instruction Fuzzy Hash: 30C15022A08FD582E6608F2DD94427A73B0FB99BE4F146335DB5D436A1EF3CE5898740

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 755 7ff8b8af8970-7ff8b8af8988 756 7ff8b8af898a-7ff8b8af8997 755->756 757 7ff8b8af8998-7ff8b8af89b4 PyModule_Create2 755->757 758 7ff8b8af8a90-7ff8b8af8a93 757->758 759 7ff8b8af89ba-7ff8b8af89e4 PyObject_GetAttrString PyModule_GetDict 757->759 760 7ff8b8af8a95-7ff8b8af8a99 758->760 761 7ff8b8af8aa4-7ff8b8af8aae 758->761 762 7ff8b8af8a6e-7ff8b8af8a78 759->762 763 7ff8b8af89ea-7ff8b8af89f0 759->763 760->761 765 7ff8b8af8a9b-7ff8b8af8a9e _Py_Dealloc 760->765 768 7ff8b8af8ac3-7ff8b8af8acd 761->768 769 7ff8b8af8ab0-7ff8b8af8abb 761->769 762->758 764 7ff8b8af8a7a-7ff8b8af8a85 762->764 766 7ff8b8af8a44 call 7ff8b8b01660 763->766 767 7ff8b8af89f2-7ff8b8af8a38 call 7ff8b8af4080 763->767 764->758 774 7ff8b8af8a87-7ff8b8af8a8a _Py_Dealloc 764->774 765->761 778 7ff8b8af8a49-7ff8b8af8a4b 766->778 767->762 781 7ff8b8af8a3a 767->781 771 7ff8b8af8ae2-7ff8b8af8aec 768->771 772 7ff8b8af8acf-7ff8b8af8ada 768->772 769->768 770 7ff8b8af8abd _Py_Dealloc 769->770 770->768 779 7ff8b8af8b01-7ff8b8af8b0b 771->779 780 7ff8b8af8aee-7ff8b8af8af9 771->780 772->771 777 7ff8b8af8adc _Py_Dealloc 772->777 774->758 777->771 778->762 782 7ff8b8af8a4d-7ff8b8af8a51 778->782 784 7ff8b8af8b20-7ff8b8af8b2a 779->784 785 7ff8b8af8b0d-7ff8b8af8b18 779->785 780->779 783 7ff8b8af8afb _Py_Dealloc 780->783 781->766 786 7ff8b8af8a53-7ff8b8af8a56 _Py_Dealloc 782->786 787 7ff8b8af8a5c-7ff8b8af8a6d 782->787 783->779 789 7ff8b8af8b3f-7ff8b8af8b49 784->789 790 7ff8b8af8b2c-7ff8b8af8b37 784->790 785->784 788 7ff8b8af8b1a _Py_Dealloc 785->788 786->787 788->784 792 7ff8b8af8b5e-7ff8b8af8b68 789->792 793 7ff8b8af8b4b-7ff8b8af8b56 789->793 790->789 791 7ff8b8af8b39 _Py_Dealloc 790->791 791->789 794 7ff8b8af8b7d-7ff8b8af8b87 792->794 795 7ff8b8af8b6a-7ff8b8af8b75 792->795 793->792 796 7ff8b8af8b58 _Py_Dealloc 793->796 798 7ff8b8af8b9c-7ff8b8af8ba6 794->798 799 7ff8b8af8b89-7ff8b8af8b94 794->799 795->794 797 7ff8b8af8b77 _Py_Dealloc 795->797 796->792 797->794 801 7ff8b8af8bbb-7ff8b8af8bc5 798->801 802 7ff8b8af8ba8-7ff8b8af8bb3 798->802 799->798 800 7ff8b8af8b96 _Py_Dealloc 799->800 800->798 804 7ff8b8af8bc7-7ff8b8af8bd2 801->804 805 7ff8b8af8bda-7ff8b8af8be6 801->805 802->801 803 7ff8b8af8bb5 _Py_Dealloc 802->803 803->801 804->805 806 7ff8b8af8bd4 _Py_Dealloc 804->806 806->805
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267090500.00007FF8B8AF1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF8B8AF0000, based on PE: true
                                                          • Associated: 00000002.00000002.3267030615.00007FF8B8AF0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267162979.00007FF8B8B04000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267222840.00007FF8B8B0A000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267280567.00007FF8B8B0E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8af0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Module_$AttrCreate2DeallocDictObject_String
                                                          • String ID: __name__
                                                          • API String ID: 2272293537-3954359393
                                                          • Opcode ID: 4f397e03f3fee52b4d0ecdc321c4dbf54df67c5ae79e314d5e53c94f376fe017
                                                          • Instruction ID: dfb8f2f823dfcd781feb8611b6e5bc03778df8b788519d204f5e6e0f60ff7a65
                                                          • Opcode Fuzzy Hash: 4f397e03f3fee52b4d0ecdc321c4dbf54df67c5ae79e314d5e53c94f376fe017
                                                          • Instruction Fuzzy Hash: C671F670E0AB0682FE599B7CA89513873A4BF45BD4F195634CB4E922B0CF3CA453C30A

                                                          Control-flow Graph

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267090500.00007FF8B8AF1000.00000020.00000001.01000000.00000015.sdmp, Offset: 00007FF8B8AF0000, based on PE: true
                                                          • Associated: 00000002.00000002.3267030615.00007FF8B8AF0000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267162979.00007FF8B8B04000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267222840.00007FF8B8B0A000.00000004.00000001.01000000.00000015.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267280567.00007FF8B8B0E000.00000002.00000001.01000000.00000015.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8af0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$ItemObject_$Err_FormatFromImportObjectUnicode_$AttrClearDict_ErrorFilenameImport_LevelModuleModule_
                                                          • String ID: %U.%U$cannot import name %R from %R (%S)
                                                          • API String ID: 3630264407-438398067
                                                          • Opcode ID: e640b3e46d7a37767e1cf98e302e0e9caccce58bf8976f823c6c11df13f9ec8d
                                                          • Instruction ID: f1edb45f4c41130e16c6fc287bb96f5aa01b370d5921574521eab0f64a06b7d4
                                                          • Opcode Fuzzy Hash: e640b3e46d7a37767e1cf98e302e0e9caccce58bf8976f823c6c11df13f9ec8d
                                                          • Instruction Fuzzy Hash: 7C41B372A1AA4282EA589F2AA88427D73A4FF55FC8F045034CF4E57764DF3CE4478309

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 832 7ff615a218f0-7ff615a2192b call 7ff615a23f70 835 7ff615a21bc1-7ff615a21be5 call 7ff615a2b870 832->835 836 7ff615a21931-7ff615a21971 call 7ff615a276a0 832->836 841 7ff615a21977-7ff615a21987 call 7ff615a2f9f4 836->841 842 7ff615a21bae-7ff615a21bb1 call 7ff615a2f36c 836->842 847 7ff615a21989-7ff615a2199c call 7ff615a22760 841->847 848 7ff615a219a1-7ff615a219bd call 7ff615a2f6bc 841->848 846 7ff615a21bb6-7ff615a21bbe 842->846 846->835 847->842 853 7ff615a219d7-7ff615a219ec call 7ff615a34154 848->853 854 7ff615a219bf-7ff615a219d2 call 7ff615a22760 848->854 859 7ff615a21a06-7ff615a21a87 call 7ff615a21bf0 * 2 call 7ff615a2f9f4 853->859 860 7ff615a219ee-7ff615a21a01 call 7ff615a22760 853->860 854->842 868 7ff615a21a8c-7ff615a21a9f call 7ff615a34170 859->868 860->842 871 7ff615a21ab9-7ff615a21ad2 call 7ff615a2f6bc 868->871 872 7ff615a21aa1-7ff615a21ab4 call 7ff615a22760 868->872 877 7ff615a21aec-7ff615a21b08 call 7ff615a2f430 871->877 878 7ff615a21ad4-7ff615a21ae7 call 7ff615a22760 871->878 872->842 883 7ff615a21b1b-7ff615a21b29 877->883 884 7ff615a21b0a-7ff615a21b16 call 7ff615a225f0 877->884 878->842 883->842 886 7ff615a21b2f-7ff615a21b3e 883->886 884->842 888 7ff615a21b40-7ff615a21b46 886->888 889 7ff615a21b48-7ff615a21b55 888->889 890 7ff615a21b60-7ff615a21b6f 888->890 891 7ff615a21b71-7ff615a21b7a 889->891 890->890 890->891 892 7ff615a21b7c-7ff615a21b7f 891->892 893 7ff615a21b8f 891->893 892->893 894 7ff615a21b81-7ff615a21b84 892->894 895 7ff615a21b91-7ff615a21bac 893->895 894->893 896 7ff615a21b86-7ff615a21b89 894->896 895->842 895->888 896->893 897 7ff615a21b8b-7ff615a21b8d 896->897 897->895
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _fread_nolock$Message
                                                          • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                          • API String ID: 677216364-3497178890
                                                          • Opcode ID: 35ecb335ea51856d2c4ba3a5b8941be69d2e3f44d34773facc26e79b75a298fb
                                                          • Instruction ID: f7a4a0deadb81fe3a89be8279d37a16d76d36532af825da770577c4b51b9e83c
                                                          • Opcode Fuzzy Hash: 35ecb335ea51856d2c4ba3a5b8941be69d2e3f44d34773facc26e79b75a298fb
                                                          • Instruction Fuzzy Hash: 5971C635A48E8685EB20CB36E4422B9A3A1FF84FA4F444235D98DC7769EF3CED448700

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                          • API String ID: 2030045667-3659356012
                                                          • Opcode ID: 6f52e494031d5ca2484d2f9d573e2a1dcf24fa62387402d5cbc9e3bb6a366fed
                                                          • Instruction ID: 774d48396f049f332c83feb58827fe55be9e90209898c78f444261bfd75a46e4
                                                          • Opcode Fuzzy Hash: 6f52e494031d5ca2484d2f9d573e2a1dcf24fa62387402d5cbc9e3bb6a366fed
                                                          • Instruction Fuzzy Hash: D6418225B88A4681EE209B66A9421B6E390FF04FE4F584231DE5D87AB5EF3CFD418700

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1075 7ff615a211f0-7ff615a2124d call 7ff615a2b0a0 1078 7ff615a21277-7ff615a2128f call 7ff615a34170 1075->1078 1079 7ff615a2124f-7ff615a21276 call 7ff615a225f0 1075->1079 1084 7ff615a212ad-7ff615a212bd call 7ff615a34170 1078->1084 1085 7ff615a21291-7ff615a212a8 call 7ff615a22760 1078->1085 1091 7ff615a212db-7ff615a212ed 1084->1091 1092 7ff615a212bf-7ff615a212d6 call 7ff615a22760 1084->1092 1090 7ff615a21409-7ff615a2143d call 7ff615a2ad80 call 7ff615a3415c * 2 1085->1090 1094 7ff615a212f0-7ff615a21315 call 7ff615a2f6bc 1091->1094 1092->1090 1102 7ff615a2131b-7ff615a21325 call 7ff615a2f430 1094->1102 1103 7ff615a21401 1094->1103 1102->1103 1108 7ff615a2132b-7ff615a21337 1102->1108 1103->1090 1109 7ff615a21340-7ff615a21368 call 7ff615a294e0 1108->1109 1112 7ff615a213e6-7ff615a213fc call 7ff615a225f0 1109->1112 1113 7ff615a2136a-7ff615a2136d 1109->1113 1112->1103 1114 7ff615a2136f-7ff615a21379 1113->1114 1115 7ff615a213e1 1113->1115 1117 7ff615a2137b-7ff615a21389 call 7ff615a2fdfc 1114->1117 1118 7ff615a213a4-7ff615a213a7 1114->1118 1115->1112 1124 7ff615a2138e-7ff615a21391 1117->1124 1119 7ff615a213a9-7ff615a213b7 call 7ff615a49140 1118->1119 1120 7ff615a213ba-7ff615a213bf 1118->1120 1119->1120 1120->1109 1123 7ff615a213c5-7ff615a213c8 1120->1123 1126 7ff615a213ca-7ff615a213cd 1123->1126 1127 7ff615a213dc-7ff615a213df 1123->1127 1128 7ff615a2139f-7ff615a213a2 1124->1128 1129 7ff615a21393-7ff615a2139d call 7ff615a2f430 1124->1129 1126->1112 1130 7ff615a213cf-7ff615a213d7 1126->1130 1127->1103 1128->1112 1129->1120 1129->1128 1130->1094
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                          • API String ID: 2030045667-2813020118
                                                          • Opcode ID: e496b0bcba3729b97d06f0e46ecf728c80844e1a155ab2c5c02d584ccd3a7d05
                                                          • Instruction ID: a22e92a38c2824d56ef444bfd9ff73625bc3ae78b804c4956e9f44256b7a2129
                                                          • Opcode Fuzzy Hash: e496b0bcba3729b97d06f0e46ecf728c80844e1a155ab2c5c02d584ccd3a7d05
                                                          • Instruction Fuzzy Hash: B451D462A48E4241EA649B66A4413BAA291BF44FA4F484335EE4DC7BE5EF3CED01C700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: 61b7c791dd7b4870e419cd94b23561cebff66563b6152af2ba6a1b175460b8f9
                                                          • Instruction ID: 33264224313a5734f1e0c87458eb5b21de11d44e87ae9996d1b21e6b0ff3bd42
                                                          • Opcode Fuzzy Hash: 61b7c791dd7b4870e419cd94b23561cebff66563b6152af2ba6a1b175460b8f9
                                                          • Instruction Fuzzy Hash: 09C1D122A4CF8A91EAA0DB1594442BDB791EF91FA8F154331DA4E837B1CFBCEC558300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3270094699.00007FF8B93C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                          • Associated: 00000002.00000002.3269996369.00007FF8B93C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270164094.00007FF8B93C8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270292182.00007FF8B93D0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270351890.00007FF8B93D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b93c0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_Long_Occurred$Arg_KeywordsUnpack
                                                          • String ID:
                                                          • API String ID: 591546834-0
                                                          • Opcode ID: 20742500c124c423266bfdab1c304cd984d45cdb87b6458035995fc094c063de
                                                          • Instruction ID: 3bdd5a8d9ebf56a21ccc82ee740718628e8eb5c6ffa18433f6827496ce9cdee8
                                                          • Opcode Fuzzy Hash: 20742500c124c423266bfdab1c304cd984d45cdb87b6458035995fc094c063de
                                                          • Instruction Fuzzy Hash: 97415926A09FC252FAA59F29A45877A62B0FF48BE5F142634DF1E42790DF3CE4498300
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,00007FF615A23534), ref: 00007FF615A23411
                                                            • Part of subcall function 00007FF615A229E0: GetLastError.KERNEL32(?,?,?,00007FF615A2342E,?,00007FF615A23534), ref: 00007FF615A22A14
                                                            • Part of subcall function 00007FF615A229E0: FormatMessageW.KERNEL32(?,?,?,00007FF615A2342E), ref: 00007FF615A22A7D
                                                            • Part of subcall function 00007FF615A229E0: MessageBoxW.USER32 ref: 00007FF615A22ACF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message$ErrorFileFormatLastModuleName
                                                          • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                          • API String ID: 517058245-2863816727
                                                          • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                          • Instruction ID: 434bb14bfbe818b65a19d164a90e83b2f6ab42f9d93d1c9a3e9892e9ca8fe901
                                                          • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                          • Instruction Fuzzy Hash: FF219511B58E4291FA219B36E8163B9E290BF49FA5F804337E65DC65F5EF2CDD048700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3269315418.00007FF8B9061000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                          • Associated: 00000002.00000002.3269250127.00007FF8B9060000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269445450.00007FF8B906B000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269525176.00007FF8B9070000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269619893.00007FF8B9071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b9060000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_Eval_FilenameFromLibraryThreadWindowsWith$AddressFreeLoadProcRestoreSave
                                                          • String ID:
                                                          • API String ID: 568911590-0
                                                          • Opcode ID: e2200b3415209b6f4be3470a672ca2eac9ae6c36c8dafb9bbec9a9066c3d2c4c
                                                          • Instruction ID: 6d2caef7de90f54d3cadbc956b80b6f41a0e4c7ca7f7b050969c49241ef1c7b3
                                                          • Opcode Fuzzy Hash: e2200b3415209b6f4be3470a672ca2eac9ae6c36c8dafb9bbec9a9066c3d2c4c
                                                          • Instruction Fuzzy Hash: 28012C61B1DA8681EE54DF66B90813E63A1BF48FC1B448034DE4E07B58DF3CD0428300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3268470633.00007FF8B8CE1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B8CE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3268399588.00007FF8B8CE0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 00000002.00000002.3268531245.00007FF8B8CE7000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 00000002.00000002.3268588757.00007FF8B8CEC000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 00000002.00000002.3268675265.00007FF8B8CEE000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8ce0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: D_do_all_providedDeallocFrozenModule_ObjectSet_
                                                          • String ID: openssl_md_meth_names
                                                          • API String ID: 4100423519-1600430994
                                                          • Opcode ID: c7570a8fd0a96cd5cb6b92ca885935ccddc4592bf0b1fee869571e27cecb3355
                                                          • Instruction ID: 355b0a75d8bad24c7fce22dd532cdde9883122b2db41d1741b4aef869c0f023a
                                                          • Opcode Fuzzy Hash: c7570a8fd0a96cd5cb6b92ca885935ccddc4592bf0b1fee869571e27cecb3355
                                                          • Instruction Fuzzy Hash: 1E014FB1A08642C3EBB44B78AC2D2796390BB487D6F144535DB6E42594CF7DF546C708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267779046.00007FF8B8CC1000.00000020.00000001.01000000.00000014.sdmp, Offset: 00007FF8B8CC0000, based on PE: true
                                                          • Associated: 00000002.00000002.3267713988.00007FF8B8CC0000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267887097.00007FF8B8CC2000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267975575.00007FF8B8CC4000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8cc0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Import$Capsule_DeallocImport_Module
                                                          • String ID: charset_normalizer.md__mypyc$charset_normalizer.md__mypyc.init_charset_normalizer___md
                                                          • API String ID: 1394619730-824592145
                                                          • Opcode ID: 4dbea5a90385b545af12b2b3c19e32250d97452fe296dfd027e4427eacffc248
                                                          • Instruction ID: eac13d9fe312367e39179017df4435230525c799afa7cfe5f860a67710c52502
                                                          • Opcode Fuzzy Hash: 4dbea5a90385b545af12b2b3c19e32250d97452fe296dfd027e4427eacffc248
                                                          • Instruction Fuzzy Hash: CBE01AA5E0A60381EB989F2EBC6C1B022A07F547C0F884436C30D02254EF2CA94F8B98
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3269315418.00007FF8B9061000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                          • Associated: 00000002.00000002.3269250127.00007FF8B9060000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269445450.00007FF8B906B000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269525176.00007FF8B9070000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000002.00000002.3269619893.00007FF8B9071000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b9060000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: BuildErr_FromSystemTimesValueWindows
                                                          • String ID: (ddd)
                                                          • API String ID: 2325294781-2401937087
                                                          • Opcode ID: ba0bdbf672466f0367906313a703a410643c45962e3f53d94245850bb14888e0
                                                          • Instruction ID: 041493ac7001e1b410b2efb9756859def533889a811a8f2ec867c6dbf50a3f27
                                                          • Opcode Fuzzy Hash: ba0bdbf672466f0367906313a703a410643c45962e3f53d94245850bb14888e0
                                                          • Instruction Fuzzy Hash: 89119631A29E814FC953DB799940526E3A5AFAA7D0B448322F50FB1E10EB2CE0978B00
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 1279662727-0
                                                          • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                          • Instruction ID: ec32103ba5c952ee524e886234061cf783d406dd014e49015af9a18ca01c7717
                                                          • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                          • Instruction Fuzzy Hash: 4A41A422D58B8243F790CB609504379A260FF94F78F109335E69C83AE5EF7CA9E08700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3270094699.00007FF8B93C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                          • Associated: 00000002.00000002.3269996369.00007FF8B93C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270164094.00007FF8B93C8000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270292182.00007FF8B93D0000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000002.00000002.3270351890.00007FF8B93D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b93c0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Eval_Thread$RestoreSave_errnoclosesocket
                                                          • String ID:
                                                          • API String ID: 1624953543-0
                                                          • Opcode ID: 4126259241acdad7b25acebef5f1c11f1c1da3f86697e3691b0e3be26900da62
                                                          • Instruction ID: bf59571a8c0bd51e14b0d3d212802934602b47656722bb80a43b107d34cad838
                                                          • Opcode Fuzzy Hash: 4126259241acdad7b25acebef5f1c11f1c1da3f86697e3691b0e3be26900da62
                                                          • Instruction Fuzzy Hash: F2F0FF21A18FD182E6545F59A84806A7371EB4CBF0B146730DB7A037E4CF7DE94A8300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                          • String ID:
                                                          • API String ID: 3251591375-0
                                                          • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                          • Instruction ID: 7aa536c079c6f0e12130e188430d06e86234429065cb3d558fe177d76107df69
                                                          • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                          • Instruction Fuzzy Hash: 8B315E11ACDE4751FA54A7B6D4633B9A281AF41FA8F440235EA0EC72F3DF6DAD048601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: 8760811a46c694da2ce7fcb713cb8132a6e7826c56b7b9f56bdeeaa18c726bba
                                                          • Instruction ID: 95063829c713752744a865e34dc590758fa16b86c60a14ed7552f7d9f83d2a1c
                                                          • Opcode Fuzzy Hash: 8760811a46c694da2ce7fcb713cb8132a6e7826c56b7b9f56bdeeaa18c726bba
                                                          • Instruction Fuzzy Hash: 1251D321B49A8246EA689E37940367AA285EF44FB8F148735DE7D837F5CF3CDC408600
                                                          APIs
                                                          • FindCloseChangeNotification.KERNEL32(?,?,?,00007FF615A39CE5,?,?,00000000,00007FF615A39D9A), ref: 00007FF615A39ED6
                                                          • GetLastError.KERNEL32(?,?,?,00007FF615A39CE5,?,?,00000000,00007FF615A39D9A), ref: 00007FF615A39EE0
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ChangeCloseErrorFindLastNotification
                                                          • String ID:
                                                          • API String ID: 1687624791-0
                                                          • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                          • Instruction ID: 1a56008033fd5afdcc743bf0c955a081b0f05bb2f6b41150f8e002ed8d30fcfb
                                                          • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                          • Instruction Fuzzy Hash: 73218E21F5CE8241EED0DB64B480279A6929F84FB8F184335DA2E872E1CF6CAD448201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastPointer
                                                          • String ID:
                                                          • API String ID: 2976181284-0
                                                          • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                          • Instruction ID: d75f48e1f7902ad65a18d41382531fdee14edc3b262ce96aea4a314e825f12d2
                                                          • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                          • Instruction Fuzzy Hash: E911BF61A08F8581DA50CB29B844169A362AF44FF8F584331EE7D87BFACF3CD8508704
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                          • Instruction ID: 590876a32080199f335b1121d6d3b23d611ecf3c7b0230dd48f52509e0b43458
                                                          • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                          • Instruction Fuzzy Hash: EC41B132948A0987EAA4DE55E54127DF7A1EF55FA8F140331D69AC36E0CF3CE802C751
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _fread_nolock
                                                          • String ID:
                                                          • API String ID: 840049012-0
                                                          • Opcode ID: a0f762802b007f79df3f5188bfeabeb6c0338d12f38915015ea771c39cfbc038
                                                          • Instruction ID: 6d78ea185521d3de9b6094c55ddecfc632c8d717a6c536fe264105539e34bcc4
                                                          • Opcode Fuzzy Hash: a0f762802b007f79df3f5188bfeabeb6c0338d12f38915015ea771c39cfbc038
                                                          • Instruction Fuzzy Hash: 7621B721B88A5145FA149B27A9063FAEA41BF45FE4F8C4530DD0D877A6DF7DE941C700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: 41d876f7d863186cb99ffae5cfc70294694b7844598519de76c307bd1dc1648a
                                                          • Instruction ID: f4842ebe826b19fa881ab012a480bb4b0e587af7cf3f103574c9b0215dc8fdd4
                                                          • Opcode Fuzzy Hash: 41d876f7d863186cb99ffae5cfc70294694b7844598519de76c307bd1dc1648a
                                                          • Instruction Fuzzy Hash: ED319C22E58E6286E691DB5598513BDAA50AF50FB8F450336DA1D833F2CFBCEC518320
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                          • Instruction ID: 13c8e6eff1e1b81120e819abe5e936ae5ce112c6d51b3cc13fb72018a46336a2
                                                          • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                          • Instruction Fuzzy Hash: C9119621A5DE8145EAE0DF95D40117EE3A4AF59FA8F444231EA8CD76A6DF3CDC408740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                          • Instruction ID: 6a3373f6ade36e011149639d26d829bd8690b74f46a64ba711cd3a427cb0b0b7
                                                          • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                          • Instruction Fuzzy Hash: 3B215632658E8186DB618F58D480379F661EF98FA4F184334D69D87AE5DF3CD8008B00
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID:
                                                          • API String ID: 3215553584-0
                                                          • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                          • Instruction ID: 37e1d5030f1a1c2f31f273b8de2d0b2b7f78af5a3279489abf0a7cd75e2731a8
                                                          • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                          • Instruction Fuzzy Hash: 5501A525A48F4241E944DF675902069E699AF55FF0F484731DE6C93BE6DF3CD9028300
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF615A3A63A,?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A), ref: 00007FF615A3DEFD
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                          • Instruction ID: 4c87eefaad83f9fad80927af22213462643e1d2995d10e718f516db8f66a134d
                                                          • Opcode Fuzzy Hash: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                          • Instruction Fuzzy Hash: 91F04944B89A47C0FE94D7A658512B5D2906F98FA8F5C4330D90EC62A1DF2CAC898250
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(?,?,?,00007FF615A2FFB0,?,?,?,00007FF615A3161A,?,?,?,?,?,00007FF615A32E09), ref: 00007FF615A3C94A
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                          • Instruction ID: 25e08d64fb14db1bbbc15e59e6bbd9c34330ef52f37b16d57ede266a0008b8b5
                                                          • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                          • Instruction Fuzzy Hash: AFF05E00B98A4784FE94D7B29C2127992805F48F78F094330D92EC62E1EF2CAC408110
                                                          APIs
                                                            • Part of subcall function 00007FF615A286B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF615A23FA4,00000000,00007FF615A21925), ref: 00007FF615A286E9
                                                          • LoadLibraryW.KERNEL32(?,00007FF615A25C06,?,00007FF615A2308E), ref: 00007FF615A281C2
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLibraryLoadMultiWide
                                                          • String ID:
                                                          • API String ID: 2592636585-0
                                                          • Opcode ID: 637d93bcaba6b3ef3808867d80487fbb7a80e425bc13fea3da321eb74d5281f1
                                                          • Instruction ID: a8c52203fcdf8dfcb23a3bd49efef91830774016038e32e81289fc52b86c789e
                                                          • Opcode Fuzzy Hash: 637d93bcaba6b3ef3808867d80487fbb7a80e425bc13fea3da321eb74d5281f1
                                                          • Instruction Fuzzy Hash: A8D0C201F24A4681FF84EBBBBA46579A192AF89FD0F48C134EE1C43B66DE3CC4800B00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocDict_$FromItemLongLong_StringX_ctrl
                                                          • String ID: accept$accept_good$accept_renegotiate$cache_full$connect$connect_good$connect_renegotiate$hits$misses$number$timeouts
                                                          • API String ID: 3804526530-4076585280
                                                          • Opcode ID: 9bb32dfcd675d2c24069937e8235e7c69130e9df25574439dcdacdb0d8f7f3d6
                                                          • Instruction ID: 92e5abfa46d0221e8423f87ce979d9f4a750e7f8690fc05a1b00236284c10784
                                                          • Opcode Fuzzy Hash: 9bb32dfcd675d2c24069937e8235e7c69130e9df25574439dcdacdb0d8f7f3d6
                                                          • Instruction Fuzzy Hash: FCC13175A08B0A86EA156F79E56867D3BA0FF45BC5F884434CF0E06B64EF2CF41A8305
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: String$Err_FromSizeUnicode_$E_printFormatL_sk_numL_sk_valueList_O_ctrlO_getsO_newO_s_memTuple_WarnX509_get_ext_d2istrchr
                                                          • String ID: %X:%X:%X:%X:%X:%X:%X:%X$%d.%d.%d.%d$<INVALID>$<invalid>$DNS$DirName$IP Address$Invalid value %.200s$Registered ID$URI$Unknown general name type %d$email$failed to allocate BIO
                                                          • API String ID: 359532264-4109427827
                                                          • Opcode ID: 4bcc3934c0b1a15c61bc44874913e03d2a3a1538fa544ffd736aea6974b17af1
                                                          • Instruction ID: 2227b4e15342cf9afe1844b0d9ec46cabe62c9d6b4370c085aa3054f768d4f4e
                                                          • Opcode Fuzzy Hash: 4bcc3934c0b1a15c61bc44874913e03d2a3a1538fa544ffd736aea6974b17af1
                                                          • Instruction Fuzzy Hash: 1CF19221A0DA4786EA959F3DA85893D6BA1BF85BC1F984031CF4E02754EF3CF44AC708
                                                          APIs
                                                          • _PyObject_GC_New.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B76E
                                                          • ERR_clear_error.LIBCRYPTO-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B7B1
                                                          • PyEval_SaveThread.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B7B7
                                                          • SSL_new.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B7C3
                                                          • PyEval_RestoreThread.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B7D0
                                                          • _Py_Dealloc.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B7E8
                                                          • SSL_get0_param.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B804
                                                          • X509_VERIFY_PARAM_set_hostflags.LIBCRYPTO-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B810
                                                          • SSL_set_ex_data.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B81F
                                                          • SSL_set_fd.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B832
                                                          • BIO_up_ref.LIBCRYPTO-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B846
                                                          • BIO_up_ref.LIBCRYPTO-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B858
                                                          • SSL_set_bio.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B86A
                                                          • SSL_ctrl.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B87F
                                                          • SSL_get_verify_mode.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B898
                                                          • SSL_get_verify_callback.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B8A9
                                                          • SSL_set_verify.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B8BB
                                                          • SSL_set_post_handshake_auth.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B8C5
                                                          • SSL_get_rbio.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B8F3
                                                          • BIO_ctrl.LIBCRYPTO-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B908
                                                          • SSL_get_wbio.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B912
                                                          • BIO_ctrl.LIBCRYPTO-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B923
                                                          • PyEval_SaveThread.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B929
                                                          • SSL_set_connect_state.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B93B
                                                          • SSL_set_accept_state.LIBSSL-3(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B943
                                                          • PyEval_RestoreThread.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B94C
                                                          • PyWeakref_NewRef.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B960
                                                          • _Py_Dealloc.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B9A4
                                                          • PyObject_GC_Track.PYTHON311(?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B2B9DB
                                                          Strings
                                                          • Cannot create a client socket with a PROTOCOL_TLS_SERVER context, xrefs: 00007FF8B8B2B75D
                                                          • Cannot create a server socket with a PROTOCOL_TLS_CLIENT context, xrefs: 00007FF8B8B2B716
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Eval_Thread$DeallocO_ctrlO_up_refObject_RestoreSave$L_ctrlL_get0_paramL_get_rbioL_get_verify_callbackL_get_verify_modeL_get_wbioL_newL_set_accept_stateL_set_bioL_set_connect_stateL_set_ex_dataL_set_fdL_set_post_handshake_authL_set_verifyM_set_hostflagsR_clear_errorTrackWeakref_X509_
                                                          • String ID: Cannot create a client socket with a PROTOCOL_TLS_SERVER context$Cannot create a server socket with a PROTOCOL_TLS_CLIENT context
                                                          • API String ID: 4263894999-1683031804
                                                          • Opcode ID: 0031bbf280b373c30cfbe2cbbd0a71c1935be5ad4a206d99c4ca01a24e5316e2
                                                          • Instruction ID: c18e87e7b727711af9a87ba2da35c8c41c6c0e51cd40f0a0cd90ad19289cc2e2
                                                          • Opcode Fuzzy Hash: 0031bbf280b373c30cfbe2cbbd0a71c1935be5ad4a206d99c4ca01a24e5316e2
                                                          • Instruction Fuzzy Hash: B8913E75A08B46C6EA649F3AE44423D6BA0FF89BD0F945139CB4E47765CF3CE44A8708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Deadline_DeallocErr_Eval_O_ctrlThread$CheckFromInitL_get_rbioL_get_wbioL_write_exLong_ObjectR_clear_errorR_peek_last_errorRestoreSaveSignalsSize_tStringWeakref_
                                                          • String ID: 3$The write operation timed out$Underlying socket connection gone$Underlying socket has been closed.$Underlying socket too large for select().
                                                          • API String ID: 919700936-2917282068
                                                          • Opcode ID: bf6b3c890ac77d66f34ece76bee8f8e568b33e21db145761fff3f3cb08034e98
                                                          • Instruction ID: 8a7bbdff32601b60852db7c2726923dd5a479975748c95e0dd5f55726e77a4e6
                                                          • Opcode Fuzzy Hash: bf6b3c890ac77d66f34ece76bee8f8e568b33e21db145761fff3f3cb08034e98
                                                          • Instruction Fuzzy Hash: 98716226A08A4A85EB649F3A9854A7D6BA0FF89BD4F944131DF0E43754DF3CE44BC309
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$Cert$From$StoreString$ErrorInternLastSet_Unicode_$Bytes_CertificateCertificatesCloseContextEnhancedEnumErr_FreeListOpenSequence_SizeTuple_UsageWindows
                                                          • String ID:
                                                          • API String ID: 2957225168-0
                                                          • Opcode ID: 00cfbd82ab356ececa8d0fd7a9a76f3f1247062863f5d9192ddc75cfd238cd04
                                                          • Instruction ID: dc2dedddff1dcd89af0cb527c619315e828c966f1f2aa788b081cfbd2c701d0a
                                                          • Opcode Fuzzy Hash: 00cfbd82ab356ececa8d0fd7a9a76f3f1247062863f5d9192ddc75cfd238cd04
                                                          • Instruction Fuzzy Hash: B0616C31E0DA0686FA599F79995463D6BA4BF45FE0F985434CB0E06B90DF3DE84B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Deadline_DeallocEval_O_ctrlThread$Err_InitL_get_rbioL_get_wbioL_set_read_aheadL_shutdownObjectRestoreSaveStringWeakref_
                                                          • String ID: B$The read operation timed out$The write operation timed out$Underlying socket connection gone$Underlying socket too large for select().
                                                          • API String ID: 1084328889-1139084988
                                                          • Opcode ID: 786450713eaa2fccca575bb657458fb339c0d4207d5a8d7b04ee1e30d4079a13
                                                          • Instruction ID: fc2c390fea5b91ec106f46f729fa8523cf09170d7325b27b4a94ec9a270f0766
                                                          • Opcode Fuzzy Hash: 786450713eaa2fccca575bb657458fb339c0d4207d5a8d7b04ee1e30d4079a13
                                                          • Instruction Fuzzy Hash: AE719221A08A4A85EB619F39E454A7E6B61FF85BD0F940131CF4E076A5DF3CE447C309
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Deadline_DeallocErr_Eval_O_ctrlThread$CheckInitL_do_handshakeL_get_rbioL_get_wbioObjectR_clear_errorR_peek_last_errorRestoreSaveSignalsStringWeakref_
                                                          • String ID: Underlying socket connection gone$_ssl.c:989: The handshake operation timed out$_ssl.c:993: Underlying socket has been closed.$_ssl.c:997: Underlying socket too large for select().
                                                          • API String ID: 3614085790-581767418
                                                          • Opcode ID: fb66ee667b99c74b2d02b9e66a64809caaccb1e6aa0245eb93b8f93ad39b7a38
                                                          • Instruction ID: f0c9c480cdc378fc863229195943e09aec2e6e53ab26a5236585dc5e30fc204a
                                                          • Opcode Fuzzy Hash: fb66ee667b99c74b2d02b9e66a64809caaccb1e6aa0245eb93b8f93ad39b7a38
                                                          • Instruction Fuzzy Hash: CA619F22A08A4A85EB609F39989457D2B60FF89BD4F984135DF0E47764DF3DE487C348
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$CertFrom$StoreString$InternSet_Unicode_$Bytes_CloseContextEnumErr_ErrorFreeLastListOpenSequence_SizeTuple_Windows
                                                          • String ID:
                                                          • API String ID: 1063190953-0
                                                          • Opcode ID: eb047e3373abf0ec0b41bb6c844c8189c5dd6aff23c62de071c86eaad8799ed7
                                                          • Instruction ID: dafe8ef2c5b613c408b4dedd432824df0858c21ccb13136590db1b192f0bf0ea
                                                          • Opcode Fuzzy Hash: eb047e3373abf0ec0b41bb6c844c8189c5dd6aff23c62de071c86eaad8799ed7
                                                          • Instruction Fuzzy Hash: D5514D31E0DA0686FA559F7D995853E7B92AF45BE0F985834CB0E06B90DF2CF44B8308
                                                          APIs
                                                            • Part of subcall function 00007FF8B8B21558: OBJ_obj2txt.LIBCRYPTO-3 ref: 00007FF8B8B2159D
                                                            • Part of subcall function 00007FF8B8B21558: PyUnicode_FromStringAndSize.PYTHON311 ref: 00007FF8B8B215C3
                                                          • ASN1_STRING_type.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B24DC3), ref: 00007FF8B8B24F08
                                                          • ASN1_STRING_length.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B24DC3), ref: 00007FF8B8B24F16
                                                          • ASN1_STRING_get0_data.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B24DC3), ref: 00007FF8B8B24F22
                                                          • _Py_BuildValue_SizeT.PYTHON311(?,?,?,?,00000000,00007FF8B8B24DC3), ref: 00007FF8B8B24F38
                                                            • Part of subcall function 00007FF8B8B261C8: ERR_peek_last_error.LIBCRYPTO-3 ref: 00007FF8B8B261E0
                                                            • Part of subcall function 00007FF8B8B261C8: ERR_clear_error.LIBCRYPTO-3 ref: 00007FF8B8B26209
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Size$BuildFromG_get0_dataG_lengthG_typeJ_obj2txtR_clear_errorR_peek_last_errorStringUnicode_Value_
                                                          • String ID: D:\a\1\s\Modules\_ssl.c$Ns#$Ny#
                                                          • API String ID: 264388756-3706530764
                                                          • Opcode ID: 1db0223c09ea266e2185b0babf05a6766941df6c9eba47953027eeb8ca545ffa
                                                          • Instruction ID: baf09af6e8332fbf61d980e2b6436cc14cac477e5b9e6b57d9193db91407d3f5
                                                          • Opcode Fuzzy Hash: 1db0223c09ea266e2185b0babf05a6766941df6c9eba47953027eeb8ca545ffa
                                                          • Instruction Fuzzy Hash: E2218225A0CA9781FB549F3EA44427DAB50AF8ABD4F945030DF0E47B55DF2CE14B8708
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Mem_$SubtypeType_$DataFreeFromKindMallocReallocUnicode_
                                                          • String ID:
                                                          • API String ID: 1742244024-0
                                                          • Opcode ID: 5c1050c68e97de161cd6d8c48e9085a3eef7c228c5941944440c3b79a23d7220
                                                          • Instruction ID: f67055fcff68ead51afb635147617d205bfff68fe241acadd866793296a6374a
                                                          • Opcode Fuzzy Hash: 5c1050c68e97de161cd6d8c48e9085a3eef7c228c5941944440c3b79a23d7220
                                                          • Instruction Fuzzy Hash: 8B02FF72B0879282EF668B1DD54467D76A1EB457C4F5C4335DBAE867B8EE2EE840C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                          • String ID:
                                                          • API String ID: 313767242-0
                                                          • Opcode ID: 95a6715441451f332765c81f1ec3e8738af08fa5e0456622ef6d16990be337b9
                                                          • Instruction ID: 492b3d9449a690cda96927afa7c5cf6fa6136fa73be39909679f0d42c261660f
                                                          • Opcode Fuzzy Hash: 95a6715441451f332765c81f1ec3e8738af08fa5e0456622ef6d16990be337b9
                                                          • Instruction Fuzzy Hash: 8D318F72609A8185EB608F74E8503EE7760FB88394F84443ADB4D47AA8DF3CD14AC708
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                          • String ID:
                                                          • API String ID: 313767242-0
                                                          • Opcode ID: d5821aaf4936ad9aa18e348792a4e6496cc638c229f42c96d8f2983ca85ed40f
                                                          • Instruction ID: fcb052c189b66f679058dd11cead065dfd6e49cd1c3ddd2beeaf0f62f714e77e
                                                          • Opcode Fuzzy Hash: d5821aaf4936ad9aa18e348792a4e6496cc638c229f42c96d8f2983ca85ed40f
                                                          • Instruction Fuzzy Hash: C2316C72609B8186EB618F64E8503FD3364FB847C4F48413ADB5E57AA8EF38D648C710
                                                          APIs
                                                          • _get_daylight.LIBCMT ref: 00007FF615A44F55
                                                            • Part of subcall function 00007FF615A448A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A448BC
                                                            • Part of subcall function 00007FF615A39C58: HeapFree.KERNEL32(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C6E
                                                            • Part of subcall function 00007FF615A39C58: GetLastError.KERNEL32(?,?,?,00007FF615A42032,?,?,?,00007FF615A4206F,?,?,00000000,00007FF615A42535,?,?,?,00007FF615A42467), ref: 00007FF615A39C78
                                                            • Part of subcall function 00007FF615A39C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF615A39BEF,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A39C19
                                                            • Part of subcall function 00007FF615A39C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF615A39BEF,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A39C3E
                                                          • _get_daylight.LIBCMT ref: 00007FF615A44F44
                                                            • Part of subcall function 00007FF615A44908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF615A4491C
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451BA
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451CB
                                                          • _get_daylight.LIBCMT ref: 00007FF615A451DC
                                                          • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF615A4541C), ref: 00007FF615A45203
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                          • String ID:
                                                          • API String ID: 4070488512-0
                                                          • Opcode ID: 1e88bcb5f495bb70dc88d60703a9f776145871d29d9eb43ad6078281b4d73a6f
                                                          • Instruction ID: d898e1631a2a89432eea7d3e42ac775ccf009769dcaf6f6c091879ddfa03a7c9
                                                          • Opcode Fuzzy Hash: 1e88bcb5f495bb70dc88d60703a9f776145871d29d9eb43ad6078281b4d73a6f
                                                          • Instruction Fuzzy Hash: 3DD1C426E48A424AE720EF66D4511B9A791FF88FA4F484235EA4DC7AA5DF3CEC41C740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                          • String ID:
                                                          • API String ID: 1239891234-0
                                                          • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                          • Instruction ID: aba8df26f76246d542c0a4a1590807c708f0ba641064d68484cb93579808676d
                                                          • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                          • Instruction Fuzzy Hash: E0315332658F8586DB60CF65E8402AEB3A4FF88F64F540235EA9D83B65DF38C555C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Bytes_FromO_freeR_clear_errorR_peek_last_errorSizeStringX509i2d_
                                                          • String ID: D:\a\1\s\Modules\_ssl.c
                                                          • API String ID: 2720122973-132925792
                                                          • Opcode ID: 9af05a4043ec2e85ce9df03048124a835a201c5827042fc1ec5692019a40c01c
                                                          • Instruction ID: 7ab7b87ab608a12df2c71bda2f35d274c4fdf905d03808de418dc84208c56fe6
                                                          • Opcode Fuzzy Hash: 9af05a4043ec2e85ce9df03048124a835a201c5827042fc1ec5692019a40c01c
                                                          • Instruction Fuzzy Hash: 47F06D51B18A4682EF008F7AE44436EA751EB89BD5F844535DE4E46B54EFBCE00E8704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Module_$Constant$Object$String
                                                          • String ID: @SECLEVEL=2:ECDH+AESGCM:ECDH+CHACHA20:ECDH+AES:DHE+AES:!aNULL:!eNULL:!aDSS:!SHA1:!AESCCM$ALERT_DESCRIPTION_ACCESS_DENIED$ALERT_DESCRIPTION_BAD_CERTIFICATE$ALERT_DESCRIPTION_BAD_CERTIFICATE_HASH_VALUE$ALERT_DESCRIPTION_BAD_CERTIFICATE_STATUS_RESPONSE$ALERT_DESCRIPTION_BAD_RECORD_MAC$ALERT_DESCRIPTION_CERTIFICATE_EXPIRED$ALERT_DESCRIPTION_CERTIFICATE_REVOKED$ALERT_DESCRIPTION_CERTIFICATE_UNKNOWN$ALERT_DESCRIPTION_CERTIFICATE_UNOBTAINABLE$ALERT_DESCRIPTION_CLOSE_NOTIFY$ALERT_DESCRIPTION_DECODE_ERROR$ALERT_DESCRIPTION_DECOMPRESSION_FAILURE$ALERT_DESCRIPTION_DECRYPT_ERROR$ALERT_DESCRIPTION_HANDSHAKE_FAILURE$ALERT_DESCRIPTION_ILLEGAL_PARAMETER$ALERT_DESCRIPTION_INSUFFICIENT_SECURITY$ALERT_DESCRIPTION_INTERNAL_ERROR$ALERT_DESCRIPTION_NO_RENEGOTIATION$ALERT_DESCRIPTION_PROTOCOL_VERSION$ALERT_DESCRIPTION_RECORD_OVERFLOW$ALERT_DESCRIPTION_UNEXPECTED_MESSAGE$ALERT_DESCRIPTION_UNKNOWN_CA$ALERT_DESCRIPTION_UNKNOWN_PSK_IDENTITY$ALERT_DESCRIPTION_UNRECOGNIZED_NAME$ALERT_DESCRIPTION_UNSUPPORTED_CERTIFICATE$ALERT_DESCRIPTION_UNSUPPORTED_EXTENSION$ALERT_DESCRIPTION_USER_CANCELLED$CERT_NONE$CERT_OPTIONAL$CERT_REQUIRED$ENCODING_DER$ENCODING_PEM$HAS_ALPN$HAS_ECDH$HAS_NPN$HAS_SNI$HAS_SSLv2$HAS_SSLv3$HAS_TLS_UNIQUE$HAS_TLSv1$HAS_TLSv1_1$HAS_TLSv1_2$HAS_TLSv1_3$HOSTFLAG_ALWAYS_CHECK_SUBJECT$HOSTFLAG_MULTI_LABEL_WILDCARDS$HOSTFLAG_NEVER_CHECK_SUBJECT$HOSTFLAG_NO_PARTIAL_WILDCARDS$HOSTFLAG_NO_WILDCARDS$HOSTFLAG_SINGLE_LABEL_SUBDOMAINS$OP_ALL$OP_CIPHER_SERVER_PREFERENCE$OP_ENABLE_MIDDLEBOX_COMPAT$OP_IGNORE_UNEXPECTED_EOF$OP_NO_COMPRESSION$OP_NO_RENEGOTIATION$OP_NO_SSLv2$OP_NO_SSLv3$OP_NO_TICKET$OP_NO_TLSv1$OP_NO_TLSv1_1$OP_NO_TLSv1_2$OP_NO_TLSv1_3$OP_SINGLE_DH_USE$OP_SINGLE_ECDH_USE$PROTOCOL_SSLv23$PROTOCOL_TLS$PROTOCOL_TLS_CLIENT$PROTOCOL_TLS_SERVER$PROTOCOL_TLSv1$PROTOCOL_TLSv1_1$PROTOCOL_TLSv1_2$PROTO_MAXIMUM_SUPPORTED$PROTO_MINIMUM_SUPPORTED$PROTO_SSLv3$PROTO_TLSv1$PROTO_TLSv1_1$PROTO_TLSv1_2$PROTO_TLSv1_3$SSL_ERROR_EOF$SSL_ERROR_INVALID_ERROR_CODE$SSL_ERROR_SSL$SSL_ERROR_SYSCALL$SSL_ERROR_WANT_CONNECT$SSL_ERROR_WANT_READ$SSL_ERROR_WANT_WRITE$SSL_ERROR_WANT_X509_LOOKUP$SSL_ERROR_ZERO_RETURN$VERIFY_ALLOW_PROXY_CERTS$VERIFY_CRL_CHECK_CHAIN$VERIFY_CRL_CHECK_LEAF$VERIFY_DEFAULT$VERIFY_X509_PARTIAL_CHAIN$VERIFY_X509_STRICT$VERIFY_X509_TRUSTED_FIRST$_DEFAULT_CIPHERS
                                                          • API String ID: 435332665-200463448
                                                          • Opcode ID: 4246fcb37aba479664cf045844ad5de7c1de426b030fb40a8b8529086aa4eac4
                                                          • Instruction ID: c22ace9204561fea32ef1a5d4926d7604f7c6539651c68501772e653d7ea7d26
                                                          • Opcode Fuzzy Hash: 4246fcb37aba479664cf045844ad5de7c1de426b030fb40a8b8529086aa4eac4
                                                          • Instruction Fuzzy Hash: 2822FEA4B18B1681FA049F3AE85466C2B21BF4ABD1FD85431CE1E16764DFBCE14EC718
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AddressProc
                                                          • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                          • API String ID: 190572456-3427451314
                                                          • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                          • Instruction ID: e9dd703e04d9b1959287dffc76a7792dfa3f628e931c7d2c72949f25a48c2eb6
                                                          • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                          • Instruction Fuzzy Hash: 6EE1A864A8EF4391FA55DB95A8511B4A3A9AF44F71F881336C81E863B4EF7CFD48C240
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$String$Dict_$Item$List_$X509_$From$SizeUnicode_$AppendE_printO_ctrlO_freeO_getsTupleX509_get0_notY_set$AfterBeforeE_entry_countE_get_entryErr_LongLong_O_newO_s_memX509_get_issuer_nameX509_get_subject_nameX509_get_versionY_get_dataY_get_object
                                                          • String ID: OCSP$caIssuers$crlDistributionPoints$failed to allocate BIO$issuer$notAfter$notBefore$serialNumber$subject$subjectAltName$version
                                                          • API String ID: 558561668-857226466
                                                          • Opcode ID: 9563e2034df4959f2f5ac61751c6a667d57e7973ca6279a7b1bfc31a68fb857e
                                                          • Instruction ID: c02963637144a02c8e487ccac123e9d1e7329c4a8d37e6c27192f4ebba48d483
                                                          • Opcode Fuzzy Hash: 9563e2034df4959f2f5ac61751c6a667d57e7973ca6279a7b1bfc31a68fb857e
                                                          • Instruction Fuzzy Hash: 02D15D65A0DB0785FE949F39E968A7D6BA1AF45BD1F884430CF0E46754EF3CE40A8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_$Warn$Dealloc$Eval_FormatModule_R_clear_errorStateStringThreadX509_X_ctrl$M_set_flagsM_set_hostflagsModuleRestoreS_client_methodS_methodS_server_methodSaveSv1_1_methodSv1_2_methodSv1_methodType_X_freeX_get0_paramX_newX_set_cipher_listX_set_optionsX_set_post_handshake_authX_set_session_id_context
                                                          • String ID: @SECLEVEL=2:ECDH+AESGCM:ECDH+CHACHA20:ECDH+AES:DHE+AES:!aNULL:!eNULL:!aDSS:!SHA1:!AESCCM$Cannot find internal module state$Failed to set minimum protocol 0x%x$HIGH:!aNULL:!eNULL$No cipher can be selected.$Python$invalid or unsupported protocol version %i$ssl.PROTOCOL_TLS is deprecated$ssl.PROTOCOL_TLSv1 is deprecated$ssl.PROTOCOL_TLSv1_1 is deprecated$ssl.PROTOCOL_TLSv1_2 is deprecated
                                                          • API String ID: 2039472478-3748777976
                                                          • Opcode ID: bcdf6bf99e92d8e5cd5db16b7adcdd828c2cfe9f291e85aef186543906fec9a1
                                                          • Instruction ID: 4e9714268afb9665e2a163abfbc3a5019fea09a8d7eda3de5a8381c158c2be47
                                                          • Opcode Fuzzy Hash: bcdf6bf99e92d8e5cd5db16b7adcdd828c2cfe9f291e85aef186543906fec9a1
                                                          • Instruction Fuzzy Hash: 94A13C21A09A07C6EA549F3ED95463C2BA0BF85BD4F984535CB0E47AA0DF3CE44AC74C
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_$DeallocR_clear_errorStringUnicode_X_set_default_passwd_cbX_set_default_passwd_cb_userdata$ConverterEval_ExceptionFreeMatchesMem_Thread_errno$Callable_CheckErrnoFormatFromR_peek_last_errorRestoreSaveX_get_default_passwd_cbX_get_default_passwd_cb_userdataX_use_certificate_chain_file
                                                          • String ID: certfile should be a valid filesystem path$keyfile should be a valid filesystem path$password should be a string or callable
                                                          • API String ID: 1360066414-998072137
                                                          • Opcode ID: fedce28bcc2cea23c3164a51e9c2050cc0d8cdd099b30353a80f813e5023d4e4
                                                          • Instruction ID: ba7769ff7d7244f98ed5fee2afb447c9c8176b2ac842390f48fd77df5ac2fa10
                                                          • Opcode Fuzzy Hash: fedce28bcc2cea23c3164a51e9c2050cc0d8cdd099b30353a80f813e5023d4e4
                                                          • Instruction Fuzzy Hash: 59A1E376A08A06C6EB149F79E85817D2B60BF88BD9F944531DF0E43A54CF3CE45A870C
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Module_$ObjectWith$Err_Exception$Dealloc$BasesFromPackSpecStateTuple_Type_
                                                          • String ID: A certificate could not be verified.$Non-blocking SSL socket needs to read more databefore the requested operation can be completed.$Non-blocking SSL socket needs to write more databefore the requested operation can be completed.$SSL/TLS connection terminated abruptly.$SSL/TLS session closed cleanly.$SSLCertVerificationError$SSLEOFError$SSLError$SSLSyscallError$SSLWantReadError$SSLWantWriteError$SSLZeroReturnError$System error when attempting SSL operation.$ssl.SSLCertVerificationError$ssl.SSLEOFError$ssl.SSLSyscallError$ssl.SSLWantReadError$ssl.SSLWantWriteError$ssl.SSLZeroReturnError
                                                          • API String ID: 2091157252-1330971811
                                                          • Opcode ID: eba41b414b14a5d19da5a92ffb59b808ac36444e6d063591d0875ad1b0e209c8
                                                          • Instruction ID: 7d7dad10c4b8152d565baee5d2973cb1af047034b66b384574095d1b2faa574f
                                                          • Opcode Fuzzy Hash: eba41b414b14a5d19da5a92ffb59b808ac36444e6d063591d0875ad1b0e209c8
                                                          • Instruction Fuzzy Hash: F951E661A09B4791FA109F7AE9445AC2FA0BF4ABD4F845036CB0D57A65EF3CE15BC308
                                                          APIs
                                                          • _Py_BuildValue_SizeT.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B17A
                                                          • PyDict_GetItemWithError.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B193
                                                          • _Py_Dealloc.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B1A5
                                                          • PyErr_Occurred.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B1B0
                                                          • PyLong_FromLong.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B1C1
                                                          • PyDict_GetItemWithError.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B1DA
                                                          • _Py_Dealloc.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B1EC
                                                          • PyErr_Occurred.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B1F7
                                                          • ERR_reason_error_string.LIBCRYPTO-3(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B216
                                                          • SSL_get_verify_result.LIBSSL-3(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B258
                                                          • PyLong_FromLong.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B262
                                                          • X509_verify_cert_error_string.LIBCRYPTO-3(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B280
                                                          • PyUnicode_FromString.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B28E
                                                          • PyUnicode_FromFormat.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B2B6
                                                          • PyUnicode_FromFormat.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B2F2
                                                          • PyUnicode_FromFormat.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B31F
                                                          • PyUnicode_FromFormat.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B341
                                                          • PyUnicode_FromFormat.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B35B
                                                          • _Py_BuildValue_SizeT.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B391
                                                          • PyObject_CallObject.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B3AE
                                                          • _Py_Dealloc.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B3C1
                                                          • PyObject_SetAttr.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B3E8
                                                          • PyObject_SetAttr.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B40A
                                                          • PyObject_SetAttr.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B434
                                                          • PyObject_SetAttr.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B44B
                                                          • PyErr_SetObject.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B45B
                                                          • _Py_Dealloc.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B46A
                                                          • _Py_Dealloc.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B47F
                                                          • _Py_Dealloc.PYTHON311(?,?,00000000,00000000,00000000,00007FF8B8B26209), ref: 00007FF8B8B2B493
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: From$DeallocUnicode_$FormatObject_$Attr$Err_$BuildDict_ErrorItemLongLong_ObjectOccurredSizeValue_With$CallL_get_verify_resultR_reason_error_stringStringX509_verify_cert_error_string
                                                          • String ID: %s (_ssl.c:%d)$Hostname mismatch, certificate is not valid for '%S'.$IP address mismatch, certificate is not valid for '%S'.$[%S: %S] %s (_ssl.c:%d)$[%S: %S] %s: %S (_ssl.c:%d)$[%S] %s (_ssl.c:%d)$unknown error
                                                          • API String ID: 628883730-2914327905
                                                          • Opcode ID: a0b87949c90fd48871732554e521aaeb53ffe58006c26eb17f4af4b8f6972cf2
                                                          • Instruction ID: a79cb4ba884bc99977f69f03139d9600828faff91f4c777c18da6995a027c331
                                                          • Opcode Fuzzy Hash: a0b87949c90fd48871732554e521aaeb53ffe58006c26eb17f4af4b8f6972cf2
                                                          • Instruction Fuzzy Hash: 23A14F61A09A57C5EA659F3AA89467D2BA0BF45FC0F884439CF0E47754DF3CE84B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $auto$bool$char$char16_t$char32_t$char8_t$const$decltype(auto)$double$float$int$long$long $short$signed $this $unsigned $void$volatile$wchar_t
                                                          • API String ID: 2943138195-1482988683
                                                          • Opcode ID: 9af3000e46094686c92b09a1ab6ba282d3ea35f814097fcec630d6e6c72122d6
                                                          • Instruction ID: ea1c00fc3c20ecc463a63ece1f02b3df58dc26c57316edeeabe37f8dde8ef467
                                                          • Opcode Fuzzy Hash: 9af3000e46094686c92b09a1ab6ba282d3ea35f814097fcec630d6e6c72122d6
                                                          • Instruction Fuzzy Hash: 35027E72E1861388FB289B6DD9D61BC27B1BB05BC4F9041B9CF0D16A98DF3DA644E340
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_$Buffer_DeallocExceptionMatchesUnicode_$BufferConverterEval_Object_ReleaseStringThread_errno$CheckContiguousErrnoFromR_clear_errorRestoreSaveX_load_verify_locations
                                                          • String ID: cadata should be a contiguous buffer with a single dimension$cadata should be an ASCII string or a bytes-like object$cafile should be a valid filesystem path$cafile, capath and cadata cannot be all omitted$capath should be a valid filesystem path
                                                          • API String ID: 3554890122-3904065072
                                                          • Opcode ID: e4b71f0bbde4b4683a129aa3c3d95ea4b1edc63ab98b778c1f4c94719d88b988
                                                          • Instruction ID: 73253ba4553678e89c40540434011a2163075ccf6e67d6f586276d49c3c5ccc3
                                                          • Opcode Fuzzy Hash: e4b71f0bbde4b4683a129aa3c3d95ea4b1edc63ab98b778c1f4c94719d88b988
                                                          • Instruction Fuzzy Hash: FC814A21A08A4685FB549F7EE95427D2BA1BF44BD9F984531CF0E47A94DF3CE44AC308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: J_nid2ln$BuildR_descriptionR_get_auth_nidR_get_bitsR_get_cipher_nidR_get_digest_nidR_get_idR_get_kx_nidR_get_nameR_get_versionR_is_aeadSizeValue_memset
                                                          • String ID: aead$alg_bits$auth$description$digest$kea$name$protocol$strength_bits$symmetric${sksssssssisisOssssssss}
                                                          • API String ID: 2466739568-4085912083
                                                          • Opcode ID: e2b56106839455ab27443c62e70ce10964873e32936ab5f7d357bcbb4e1ab241
                                                          • Instruction ID: cc0f81c07d250c4a14e39523814ecefcb281a74e419e86877dddb5e81fd3f9a0
                                                          • Opcode Fuzzy Hash: e2b56106839455ab27443c62e70ce10964873e32936ab5f7d357bcbb4e1ab241
                                                          • Instruction Fuzzy Hash: BA613E35A09B8685EB209F39F8442AD77A4FB887D0F941635DA9E437A4DF3CE44AC704
                                                          APIs
                                                          • PyWeakref_GetObject.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29265
                                                          • PyErr_SetString.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29292
                                                          • PyBytes_FromStringAndSize.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B292DE
                                                          • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29304
                                                          • PyErr_SetString.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B2934A
                                                          • SSL_get_rbio.LIBSSL-3(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29372
                                                          • BIO_ctrl.LIBCRYPTO-3(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29387
                                                          • SSL_get_wbio.LIBSSL-3(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29391
                                                          • BIO_ctrl.LIBCRYPTO-3(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B293A2
                                                          • _PyDeadline_Init.PYTHON311 ref: 00007FF8B8B293BE
                                                          • PyEval_SaveThread.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B293D1
                                                          • SSL_read_ex.LIBSSL-3(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B293E9
                                                          • PyEval_RestoreThread.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B2941D
                                                          • PyErr_CheckSignals.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29432
                                                          • _PyDeadline_Get.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B2944C
                                                          • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B2951B
                                                            • Part of subcall function 00007FF8B8B261C8: ERR_peek_last_error.LIBCRYPTO-3 ref: 00007FF8B8B261E0
                                                            • Part of subcall function 00007FF8B8B261C8: ERR_clear_error.LIBCRYPTO-3 ref: 00007FF8B8B26209
                                                          • SSL_get_shutdown.LIBSSL-3(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B2949D
                                                          • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B294E1
                                                          • _PyBytes_Resize.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B294F4
                                                          • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29541
                                                          • PyLong_FromSize_t.PYTHON311(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,00007FF8B8B291FA), ref: 00007FF8B8B29550
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$Err_String$Bytes_Deadline_Eval_FromO_ctrlThread$CheckInitL_get_rbioL_get_shutdownL_get_wbioL_read_exLong_ObjectR_clear_errorR_peek_last_errorResizeRestoreSaveSignalsSizeSize_tWeakref_
                                                          • String ID: The read operation timed out$Underlying socket connection gone$maximum length can't fit in a C 'int'$size should not be negative
                                                          • API String ID: 2735577670-665203206
                                                          • Opcode ID: bbfc66f33c353f3cbd66036fd6e58892e68d209f93e304ae213a7cedccde276c
                                                          • Instruction ID: b536e1708321523540595d85ab5702545e105e8ee44fc8a3c1e5e9815ecab04e
                                                          • Opcode Fuzzy Hash: bbfc66f33c353f3cbd66036fd6e58892e68d209f93e304ae213a7cedccde276c
                                                          • Instruction Fuzzy Hash: 6FA16D32E09A1A85FB649F7AD844A7D6BA0BF49BD4F950135CF1E46A94CF3CE4478308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$Err_State_$ReleaseUnraisableWrite$ArgsCallFunctionObjectObject_$EncodedEnsureFromL_get_ex_dataL_get_servernameLongLong_OccurredUnicode_Weakref_
                                                          • String ID: ascii
                                                          • API String ID: 3188396730-3510295289
                                                          • Opcode ID: 8795be1f2294d8245a4fd3ccf2d918e87ebce44b637d9288a9166bcd00813fa7
                                                          • Instruction ID: 659868635167a1640b726ca2e2547c0f1a986eec3ef60aa8e6cdb64656655074
                                                          • Opcode Fuzzy Hash: 8795be1f2294d8245a4fd3ccf2d918e87ebce44b637d9288a9166bcd00813fa7
                                                          • Instruction Fuzzy Hash: 39510125A09A5686FA149F7AD95813D6BA0BF46FD1F884438CF0E07B54DF3CA44B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dict_$Dealloc$Module_$FromItemObject$StringUnicode_$BuildLongLong_SizeStateValue_
                                                          • String ID: err_codes_to_names$err_names_to_codes$lib_codes_to_names
                                                          • API String ID: 311900024-3898622116
                                                          • Opcode ID: c6e60629ece7d000aa113861ff06567cd8a9fb5c02c61e9550bf6cae00e17cd4
                                                          • Instruction ID: 5b84a5faa8e4a10b4ee01d2a7f0783c39f47132748c21e07f0e12b44bc860466
                                                          • Opcode Fuzzy Hash: c6e60629ece7d000aa113861ff06567cd8a9fb5c02c61e9550bf6cae00e17cd4
                                                          • Instruction Fuzzy Hash: 3751E561A4DB0B91FA549F3AA81463C2BA4AF4ABD1F884435CF0D56760EF2CF45B8348
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocList_$X509_$AppendTuple$Y_set$E_entry_countE_get_entryY_get_dataY_get_object
                                                          • String ID:
                                                          • API String ID: 3918441104-0
                                                          • Opcode ID: 3f51801bdaaa6c7ce1aa21ada3a2f565099f7a717c4a6f2c9063da612d9c2b03
                                                          • Instruction ID: ad1a9bea2505784a0e384d5d321f738bb255a7dafe38cba134cb90290078c940
                                                          • Opcode Fuzzy Hash: 3f51801bdaaa6c7ce1aa21ada3a2f565099f7a717c4a6f2c9063da612d9c2b03
                                                          • Instruction Fuzzy Hash: C0511361A0DA0641FE5D6F3AA91463D6A91BF45FD5F9C0434CF2E06B54EF3CA49B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: R_clear_errorR_peek_last_error$E_add_certErr_M_read_bio_O_freeO_new_mem_bufStringX509X509_X509_bioX509_freeX_get_cert_storeX_get_default_passwd_cbX_get_default_passwd_cb_userdatad2i_
                                                          • String ID: Can't allocate buffer$Certificate data is too long.$Empty certificate data$no start line: cadata does not contain a certificate$not enough data: cadata does not contain a certificate
                                                          • API String ID: 3308083359-3246380861
                                                          • Opcode ID: 8ee09712cb90b3e5a5708cb3cba6a3a3db4649c59bd02f395c1fe461052aa58d
                                                          • Instruction ID: 2688073858fcb33bbd02497491e5ea9002255214e54343422c2f8491d62973c5
                                                          • Opcode Fuzzy Hash: 8ee09712cb90b3e5a5708cb3cba6a3a3db4649c59bd02f395c1fe461052aa58d
                                                          • Instruction Fuzzy Hash: 38517361E0CA0741FB68AF3EA84423D6A91BF457D5FA44535DB2E86A94DF3CE44B8208
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$Module_State
                                                          • String ID:
                                                          • API String ID: 3434497292-0
                                                          • Opcode ID: f1da567e134593277256ef6c3e95c8f78a145cb8c4559d5b4235226dbf4ce70b
                                                          • Instruction ID: e2fdcf0ef1c89a88b65352dcf7c12891c54cf168a2b2eab91ea30724e86b214e
                                                          • Opcode Fuzzy Hash: f1da567e134593277256ef6c3e95c8f78a145cb8c4559d5b4235226dbf4ce70b
                                                          • Instruction Fuzzy Hash: A7812D32A0EA4685FF599F7C985453C3BA8EF46FD5F988534CB1E06964CF2DA446C308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Bytes_DeallocDecodeDefaultFromStringUnicode_$BuildSizeValue_X509_get_default_cert_dirX509_get_default_cert_dir_envX509_get_default_cert_fileX509_get_default_cert_file_env
                                                          • String ID: NNNN
                                                          • API String ID: 3186749377-3742719684
                                                          • Opcode ID: 8356f06c798a757c3ae6a2c784ba46f9e0f81ad03e883303a032361db505d8fd
                                                          • Instruction ID: 1a21e8e7ae726714ac2e5a778f4ef384019ab3ab1eb5830abb40a01a467871de
                                                          • Opcode Fuzzy Hash: 8356f06c798a757c3ae6a2c784ba46f9e0f81ad03e883303a032361db505d8fd
                                                          • Instruction Fuzzy Hash: BB51B929A09B5785FA56AF39A95413C6BA0AF59FD0F8C5431CF0E07764EF3CA44B9308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_$Eval_FetchState_Thread_errno$EnsureErrnoFilenameFromL_get_ex_dataO_ctrlO_printfObjectReleaseRestoreSaveStringThread_acquire_lockThread_allocate_lockThread_release_lockWith
                                                          • String ID: %s$Unable to allocate lock
                                                          • API String ID: 2873158514-852672932
                                                          • Opcode ID: 61231d2e0c73577bd5982210dc0ea3a08a0334a548aedaf7350db9a4fc950299
                                                          • Instruction ID: aefe9658214e78f8f6757497c8b64c492b01d8ab6c6c3e249205a66cf1ba0666
                                                          • Opcode Fuzzy Hash: 61231d2e0c73577bd5982210dc0ea3a08a0334a548aedaf7350db9a4fc950299
                                                          • Instruction Fuzzy Hash: 9741DB35A18E4A82EB109F39E85426D7B60FB88BD5F984131CB4E47764DF3CE44AC304
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$Replicator::operator[]
                                                          • String ID: `anonymous namespace'
                                                          • API String ID: 3863519203-3062148218
                                                          • Opcode ID: c2c563be3abc2cd025459880134dd91d33137c93c5547e13454a58e5101b2a40
                                                          • Instruction ID: c5c9a28b1aa811a121b8ef759972524413877138e49fe5691b3e401863d1190e
                                                          • Opcode Fuzzy Hash: c2c563be3abc2cd025459880134dd91d33137c93c5547e13454a58e5101b2a40
                                                          • Instruction Fuzzy Hash: 42E14A72A08B8399EB10CF28E8801AD77A1FB45B84F8051B6EF8D17B59DF78E555E700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: R_clear_error$Err_FromObjectR_peek_last_errorWeakref_Windows
                                                          • String ID: A failure in the SSL library occurred$EOF occurred in violation of protocol$Invalid error code$Some I/O error occurred$TLS/SSL connection has been closed (EOF)$The operation did not complete (X509 lookup)$The operation did not complete (connect)$The operation did not complete (read)$The operation did not complete (write)
                                                          • API String ID: 2320205569-3413158800
                                                          • Opcode ID: 03120102754c70c1179e95157d1f2e8f2f3180142823207d431965c5264e08cc
                                                          • Instruction ID: ce2de9de0b9e84e77feae1c6c9e8a140ccae6ae7942009fd94189b9245f38a2b
                                                          • Opcode Fuzzy Hash: 03120102754c70c1179e95157d1f2e8f2f3180142823207d431965c5264e08cc
                                                          • Instruction Fuzzy Hash: FE615127A1894685E7618F39D84467DAB61BB48BD4FAC1A31DB0D137B4CF3DE84B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Eval_Thread$O_ctrlRestoreSaveX_set_keylog_callback$DeallocErr_O_free_allO_new_fpO_putsPy_fopen_objString
                                                          • String ID: # TLS secrets log file, generated by OpenSSL / Python$Can't malloc memory for keylog file
                                                          • API String ID: 2661017659-2802485923
                                                          • Opcode ID: 01f7d66f5430effe2a9e48e71a99762d840eb617121cb764a624358be77c7dca
                                                          • Instruction ID: 1d92249e6ed2d490009a0cbbac515e6d55fac4e816bf133b02f0735f75563901
                                                          • Opcode Fuzzy Hash: 01f7d66f5430effe2a9e48e71a99762d840eb617121cb764a624358be77c7dca
                                                          • Instruction Fuzzy Hash: 8D313035A08B0686EB589F39E95467D2B60FF89BD4F985131CB1E07A64DF3CE45A8308
                                                          APIs
                                                          • X509_get_ext_d2i.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B254C6
                                                          • OPENSSL_sk_num.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B254D7
                                                          • AUTHORITY_INFO_ACCESS_free.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B254E4
                                                          • PyList_New.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B2550C
                                                          • OPENSSL_sk_num.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B25523
                                                          • OPENSSL_sk_value.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B25532
                                                          • OBJ_obj2nid.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B2553E
                                                          • PyUnicode_FromStringAndSize.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B2555D
                                                          • PyList_Append.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B25575
                                                          • _Py_Dealloc.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B25587
                                                          • OPENSSL_sk_num.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B25597
                                                          • AUTHORITY_INFO_ACCESS_free.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B255A4
                                                          • PyList_Size.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B255AD
                                                          • _Py_Dealloc.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B255C5
                                                          • PyList_AsTuple.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B255D3
                                                          • _Py_Dealloc.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B255E5
                                                          • AUTHORITY_INFO_ACCESS_free.LIBCRYPTO-3(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B255F6
                                                          • _Py_Dealloc.PYTHON311(?,00000000,00000000,00007FF8B8B253B7), ref: 00007FF8B8B2560A
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocList_$L_sk_numS_free$Size$AppendFromJ_obj2nidL_sk_valueStringTupleUnicode_X509_get_ext_d2i
                                                          • String ID:
                                                          • API String ID: 230305477-0
                                                          • Opcode ID: 29fcde23e55329bb86f16b93f2084938bc948afdd21aa33df4e747b0059ff261
                                                          • Instruction ID: 2e195b3974be32c0589379d915f724ffdc7a63a7c7571c60c47645ebbd287fb7
                                                          • Opcode Fuzzy Hash: 29fcde23e55329bb86f16b93f2084938bc948afdd21aa33df4e747b0059ff261
                                                          • Instruction Fuzzy Hash: 1941FB21A09A4785FA949F3EA95463D6BA1AF45FD1F984434CF0E46754EF3CF44B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: O_free$Err_String$DecodeM_write_bio_ModuleO_ctrlO_newO_s_memR_clear_errorR_peek_last_errorStateType_Unicode_X509_X509_bioi2d_
                                                          • String ID: Unsupported format$error$failed to allocate BIO$i
                                                          • API String ID: 629801032-3389475273
                                                          • Opcode ID: 10f795596972dec6004a6f7c6a7b628bf82453e923b73c936a9f6edfda24e7e6
                                                          • Instruction ID: 60a8115abf2bace9b81a977851a2880055ed16e75661f340e2be9841f90d52a7
                                                          • Opcode Fuzzy Hash: 10f795596972dec6004a6f7c6a7b628bf82453e923b73c936a9f6edfda24e7e6
                                                          • Instruction Fuzzy Hash: 1E312C61A48A4786EA189F3DE85403D6B61FF86BC4FA85135DB5E07B64CF3CE45B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Module_$BuildFromOpenSizeValue_$L_versionL_version_numLongLong_StringUnicode_Unsigned
                                                          • String ID: IIIII$OPENSSL_VERSION$OPENSSL_VERSION_INFO$OPENSSL_VERSION_NUMBER$_OPENSSL_API_VERSION
                                                          • API String ID: 1934562181-595941748
                                                          • Opcode ID: e5135edff734d026e112ece5f23fa964709397683e749bdd5e8e8a98e7c83fa8
                                                          • Instruction ID: f7e6c952d1f356adb652e56af630f6bbed238e90dc4402f1d866211ca5502385
                                                          • Opcode Fuzzy Hash: e5135edff734d026e112ece5f23fa964709397683e749bdd5e8e8a98e7c83fa8
                                                          • Instruction Fuzzy Hash: BE218D61B1875782EB108F7AEC4886D7BA0AF85BD4FC40635CB4E47AA5DF3CE14A8704
                                                          APIs
                                                          • a2i_IPADDRESS.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29ED5
                                                          • ERR_clear_error.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29EE3
                                                          • PyUnicode_Decode.PYTHON311(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29EFD
                                                          • SSL_ctrl.LIBSSL-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29F22
                                                          • SSL_get0_param.LIBSSL-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29F59
                                                          • X509_VERIFY_PARAM_set1_host.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29F7A
                                                          • ASN1_STRING_length.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29F91
                                                          • ASN1_STRING_get0_data.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29F9D
                                                          • X509_VERIFY_PARAM_set1_ip.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29FAC
                                                          • ASN1_OCTET_STRING_free.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29FDC
                                                          • PyErr_SetString.PYTHON311(?,?,?,?,00000000,00007FF8B8B2B8DB,?,?,?,?,00007FF8A8D8BCC8,?,00000000,00007FF8B8B27095), ref: 00007FF8B8B29FF5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: X509_$DecodeErr_G_freeG_get0_dataG_lengthL_ctrlL_get0_paramM_set1_hostM_set1_ipR_clear_errorStringUnicode_a2i_
                                                          • String ID: ascii$server_hostname cannot be an empty string or start with a leading dot.$strict
                                                          • API String ID: 2286705765-138613600
                                                          • Opcode ID: d84ef8a0fa407523388efa142ee414c47e2369c5b5be485f5edd9f9ea5bfbf19
                                                          • Instruction ID: 4e51a2694c850f35bf3c4e3bdde0e5886913dca675354320000d77bf41692e80
                                                          • Opcode Fuzzy Hash: d84ef8a0fa407523388efa142ee414c47e2369c5b5be485f5edd9f9ea5bfbf19
                                                          • Instruction Fuzzy Hash: B9414F21A08A9A81EB648F2AD45463D7B60BB45FD4F984135DB4E47794DF3CF44A8708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: NameName::$Name::operator+atolswprintf_s
                                                          • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$lambda$nullptr
                                                          • API String ID: 2331677841-2441609178
                                                          • Opcode ID: 04052d8e5626c1f24672c52f4d573e3506f88365006a7f318b5907256fbad706
                                                          • Instruction ID: 3bffa83c9f78911365f1bdce3df4d2bcb5eda92a190c16cecfc470fa9c183200
                                                          • Opcode Fuzzy Hash: 04052d8e5626c1f24672c52f4d573e3506f88365006a7f318b5907256fbad706
                                                          • Instruction Fuzzy Hash: EDF18D32E0C61384FB249B6CD9941FC2BA1BF55FC4F5505B6CF0E2AA95DE3DAA44A340
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                          • API String ID: 2030045667-1550345328
                                                          • Opcode ID: 255b8301470d2c09814697fd1abaf8d0a44c74aa93bf6ce883ab7e72569204a6
                                                          • Instruction ID: 8044ba69abeedbc48344e310307dd9983709b5ff3c1d05428fdda127b8b2418c
                                                          • Opcode Fuzzy Hash: 255b8301470d2c09814697fd1abaf8d0a44c74aa93bf6ce883ab7e72569204a6
                                                          • Instruction Fuzzy Hash: 82519E65B88E4792EA109B26E9421B9A3A1BF44FB4F444331ED1C877B6EF3CF9558700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Unicode_$CompareString$With$DeallocErr_Ready
                                                          • String ID: NFC$NFD$NFKC$NFKD$invalid normalization form
                                                          • API String ID: 1067165228-3528878251
                                                          • Opcode ID: 84b6ee6fd32b1749266b3b3277a0080e416e3c06d1c571da1b6b520214c44c91
                                                          • Instruction ID: a2152db0b0e4ccf31917a7f4a7372af6ec6d69cc078b9e571ea6dfd9fce93447
                                                          • Opcode Fuzzy Hash: 84b6ee6fd32b1749266b3b3277a0080e416e3c06d1c571da1b6b520214c44c91
                                                          • Instruction Fuzzy Hash: 67412B25A0CB4285EE568B19AD5423D63A0BF45BD4F8C0639DF6E876BCDF6CE0049310
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Buffer_$Arg_$ArgumentBufferCheckContiguousDoubleErr_FillFloat_InfoObject_OccurredPositionalReleaseSizeUnicode_memset
                                                          • String ID: RAND_add$argument 1$contiguous buffer
                                                          • API String ID: 2392993315-868614225
                                                          • Opcode ID: 1b9e2eecc4020f2fc2e0eb2b79d1017b2ffb9fab5bf3a18d0856b06a322a387f
                                                          • Instruction ID: 561f39b0eae13b51e454463ff9831a8be9c516651038f0895c4966003b1184ff
                                                          • Opcode Fuzzy Hash: 1b9e2eecc4020f2fc2e0eb2b79d1017b2ffb9fab5bf3a18d0856b06a322a387f
                                                          • Instruction Fuzzy Hash: B9418E22A18A8A81EB509F39D4553BE67A0FF56BC4F949035DB4E03664DF3CE94BC704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: SizeString$BuildBytes_D_bytesErr_FromValue_
                                                          • String ID: (ks)$num must be positive
                                                          • API String ID: 413208185-3708576348
                                                          • Opcode ID: 5413d4b00cf62b1f91e158371b34f37916e9ebd3c6ab2f0718aebc8591ef1ccf
                                                          • Instruction ID: 4a78921891e1ed9840e24353ced2d0006004d89bddb7e12ed607b9a0abe4a01c
                                                          • Opcode Fuzzy Hash: 5413d4b00cf62b1f91e158371b34f37916e9ebd3c6ab2f0718aebc8591ef1ccf
                                                          • Instruction Fuzzy Hash: E6312F62E0CE4685EB549F7DE85817DABA0AF49BD0F984435CB0E47764DF2CE44A8708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: String$Bytes_DeallocErr_M_read_bio_Module_O_ctrlO_freeO_newO_s_fileStateX509X509_free
                                                          • String ID: Can't malloc memory to read file$Can't open file$Error decoding PEM-encoded file
                                                          • API String ID: 2561677103-2145957498
                                                          • Opcode ID: 52107ff9255e82979f43b8cebe6df2cb6512fb21aaf01be6787176c6d9fadd33
                                                          • Instruction ID: a77920eebef33f48abcea8c0c0b37c5598acbaa8601f8d97643efa05139e62fd
                                                          • Opcode Fuzzy Hash: 52107ff9255e82979f43b8cebe6df2cb6512fb21aaf01be6787176c6d9fadd33
                                                          • Instruction Fuzzy Hash: 9921EA21A09A5685FA149F3AE85457D6B61AF45FC0F985130DF4E07B54DF3CE45A8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: X509_$L_sk_num$BuildE_get0_objectsL_sk_valueSizeT_get0_T_get_typeValue_X509X509_check_caX_get_cert_store
                                                          • String ID: crl$x509$x509_ca${sisisi}
                                                          • API String ID: 3289807285-1814362494
                                                          • Opcode ID: 404e7197c22f9077ed36b148ac0e437149edac24c068f9a4f9e8e3821c03d761
                                                          • Instruction ID: e2534cda26f9b1f99fe586ee81b46138b028f2d47b7f2e14019dd6469625f30d
                                                          • Opcode Fuzzy Hash: 404e7197c22f9077ed36b148ac0e437149edac24c068f9a4f9e8e3821c03d761
                                                          • Instruction Fuzzy Hash: 16211A21A48B46C6EA109F7EA85407D6AA0FF88BC0F948535DE5E43324DF3CE55B874C
                                                          APIs
                                                          • X509_get_ext_d2i.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B2563F
                                                          • PyList_New.PYTHON311(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B2565B
                                                          • OPENSSL_sk_num.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B25672
                                                          • OPENSSL_sk_value.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B25685
                                                          • OPENSSL_sk_num.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B2569D
                                                          • OPENSSL_sk_value.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B256AD
                                                          • PyUnicode_FromStringAndSize.PYTHON311(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B256C3
                                                          • PyList_Append.PYTHON311(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B256D7
                                                          • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B256E9
                                                          • OPENSSL_sk_num.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B256FA
                                                          • OPENSSL_sk_num.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B2570A
                                                          • PyList_AsTuple.PYTHON311(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B25721
                                                          • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B2573C
                                                          • CRL_DIST_POINTS_free.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2544E), ref: 00007FF8B8B25745
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: L_sk_num$List_$DeallocL_sk_value$AppendFromS_freeSizeStringTupleUnicode_X509_get_ext_d2i
                                                          • String ID:
                                                          • API String ID: 3668485020-0
                                                          • Opcode ID: b71e57b5ad67c96256b7acb5803adcfac9a686cfff3ca5a2e366171d0d2f525f
                                                          • Instruction ID: 8a7536ed0b1d589655ca2cb5230470a635575e5a10589c8c350b82112fbd852a
                                                          • Opcode Fuzzy Hash: b71e57b5ad67c96256b7acb5803adcfac9a686cfff3ca5a2e366171d0d2f525f
                                                          • Instruction Fuzzy Hash: F2312A25A09A4A85EA559F3AA85493D6BA0BF84FD5F984434DF0E47760DF3CE44BC308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Module_$Dealloc$ObjectObject_$Capsule_ConstantFromMallocMem_SpecStringTrackTypeType_
                                                          • String ID: 14.0.0$_ucnhash_CAPI$ucd_3_2_0$unidata_version
                                                          • API String ID: 288921926-1430584071
                                                          • Opcode ID: 093a6e99f6c7ac6b9da6a92ec34a7c46fe80505c17f2a94d6c5583e06f8421e3
                                                          • Instruction ID: 19412c92ef86898f99d3e8092dff9825ba1b20f8d77848ba09436d68f10abbcd
                                                          • Opcode Fuzzy Hash: 093a6e99f6c7ac6b9da6a92ec34a7c46fe80505c17f2a94d6c5583e06f8421e3
                                                          • Instruction Fuzzy Hash: D621F561E1DF4381FE169B2AAD1017D22A4AF8DBD0B4C5334CB2E4A6BCDE2CF5018310
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_$MallocMem_MemoryStringi2d_
                                                          • String ID: Invalid session$d2i() failed$i2d() failed
                                                          • API String ID: 982646903-2456513230
                                                          • Opcode ID: a52d5c8c10833e6d11a4b322a8e2a53254da9a2d396a4afef34a8e83ca8ddf6d
                                                          • Instruction ID: 3c8c6577c4340457aebecad75627b1e3abdeb0312751ae9fe9f72ab9a50c531b
                                                          • Opcode Fuzzy Hash: a52d5c8c10833e6d11a4b322a8e2a53254da9a2d396a4afef34a8e83ca8ddf6d
                                                          • Instruction Fuzzy Hash: 0D211020A0DB0681EB549F3EE85413D2BA1BF89BD0FD96435DB4E46A59DF3CE44B8308
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID:
                                                          • API String ID: 2943138195-0
                                                          • Opcode ID: 9a3856515ab70ac0cbef49cb78169d28014df4ca819d0bec0dbbb0bc7461e156
                                                          • Instruction ID: e4d68d96e8ab085582df12d27f60b4cd173005ffa3b5da80338e12494fd96c2f
                                                          • Opcode Fuzzy Hash: 9a3856515ab70ac0cbef49cb78169d28014df4ca819d0bec0dbbb0bc7461e156
                                                          • Instruction Fuzzy Hash: 1AF13A7AE08A829DE710DF68D4901FC37B1AB04B8CB4444B6EF4D57A99DE38E559E340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocX509_$L_sk_numList_$AppendE_get0_objectsL_sk_valueT_get0_T_get_typeX509X509_check_caX_get_cert_store
                                                          • String ID:
                                                          • API String ID: 2012148854-0
                                                          • Opcode ID: f57d79bb14f8e671029073d346d9bfae40111dd56b8c4aa204131e60685af141
                                                          • Instruction ID: 7c30a5a96d9599709ebc2abf4992242469d2e5f359ae9680e59dc950049b8cc2
                                                          • Opcode Fuzzy Hash: f57d79bb14f8e671029073d346d9bfae40111dd56b8c4aa204131e60685af141
                                                          • Instruction Fuzzy Hash: 98315621A09A0785EA549F3EA90413D6AA0EF89FD0F980834DF1E47794EF3CF44A870C
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_$CertEnhancedErrorFromLastMallocMem_MemoryUsageWindows
                                                          • String ID:
                                                          • API String ID: 2062549779-0
                                                          • Opcode ID: 0b91f4c22a7cffdb9fa4e0110e972a0f24063810307807cd17735cf55b87cf8e
                                                          • Instruction ID: 5b2c65676b56d48047f16e58fba7a4cdb3fab539300c01dbc7733f13af5c93e3
                                                          • Opcode Fuzzy Hash: 0b91f4c22a7cffdb9fa4e0110e972a0f24063810307807cd17735cf55b87cf8e
                                                          • Instruction Fuzzy Hash: F6314021A0DA46C6FA559F7E985457D7BA0BF46BD0F984078DB0E027A0DF3CE44B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CompareStringUnicode_With$Mem_$FreeMallocSubtypeType_
                                                          • String ID: NFC$NFD$NFKC$NFKD$invalid normalization form
                                                          • API String ID: 1723213316-3528878251
                                                          • Opcode ID: 810bdfc32914a6b9f3e7d28e4da211caf2deacae3ab60a26b15fea2458299ecb
                                                          • Instruction ID: b97b82abc4af6a9fab3a5ed6725859ff1bb1e03bb92ee73a9dd49184430057bc
                                                          • Opcode Fuzzy Hash: 810bdfc32914a6b9f3e7d28e4da211caf2deacae3ab60a26b15fea2458299ecb
                                                          • Instruction Fuzzy Hash: B2519F61B0C75381FE668B2AA81467D6394AF42BC4F4C5235DF6E47BADCE6EE4018720
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_$Arg_FormatParse_SizeStringWarnX_ctrl
                                                          • String ID: The context's protocol doesn't support modification of highest and lowest version.$Unsupported TLS/SSL version 0x%x$Unsupported protocol version 0x%x$ssl.TLSVersion.SSLv3 is deprecated$ssl.TLSVersion.TLSv1 is deprecated$ssl.TLSVersion.TLSv1_1 is deprecated
                                                          • API String ID: 1675272777-3879554506
                                                          • Opcode ID: 03ffc9000f624844aef7fc2d1d66e61de32b0c60db77b69c1caa9f973f8f666f
                                                          • Instruction ID: c04703abe0c1ce98e842b3ace4668853b02097e224fcd1634928b76eac4498ac
                                                          • Opcode Fuzzy Hash: 03ffc9000f624844aef7fc2d1d66e61de32b0c60db77b69c1caa9f973f8f666f
                                                          • Instruction Fuzzy Hash: 9C416F21B1C912C5FA704F3DD85467D2A60AF817E0FE45639CB1D42AE4CF6DE98B8B09
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_String$DeallocMem_$FormatFreeMallocUnicode_memcpy
                                                          • String ID: password cannot be longer than %d bytes$unable to allocate password buffer
                                                          • API String ID: 1570515377-2395793021
                                                          • Opcode ID: 7a039f6debe8f3d6dd0c9d685eaea68fe0459fb8b2a8274287c728e286edeecf
                                                          • Instruction ID: 5d86f447e78254cc2ac851f578f3bf0cd005e5e0f381863eb5137e5864609daf
                                                          • Opcode Fuzzy Hash: 7a039f6debe8f3d6dd0c9d685eaea68fe0459fb8b2a8274287c728e286edeecf
                                                          • Instruction Fuzzy Hash: 5E411D32A08A5685EA649F3AE44497C6BA4BF89FD0F984171DF5E47B54CF3CE4478308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ModuleModule_StateType_$Arg_$KeywordsPositional
                                                          • String ID: MemoryBIO
                                                          • API String ID: 1528309267-1677681617
                                                          • Opcode ID: e8a2bea2c804dcb7256b373421a9b772333c64ad152529ccc489dce4d6474577
                                                          • Instruction ID: 828a253c1357bfd0d0bdbaba9c1d418919d1250d70a7c7af0c691fe27ff72549
                                                          • Opcode Fuzzy Hash: e8a2bea2c804dcb7256b373421a9b772333c64ad152529ccc489dce4d6474577
                                                          • Instruction Fuzzy Hash: 92313625A09A0A92EA54DF3AE95417C6B61FB89FC0F881075DF5E53728DF3CE45A8308
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Eval_H_freeThread_errno$Err_ErrnoFilenameFromHparamsM_read_ObjectPy_fopen_objR_clear_errorRestoreSaveWithX_ctrlfclose
                                                          • String ID:
                                                          • API String ID: 1346594628-0
                                                          • Opcode ID: 4afbd7a0d5713feadd50593f44757e85e3356b1a02a1e59b0b00d6403a5012b7
                                                          • Instruction ID: 84f4176a18153c9784d1851c38bf74f6ebd82255a395ff9e037d18a5db01fb1f
                                                          • Opcode Fuzzy Hash: 4afbd7a0d5713feadd50593f44757e85e3356b1a02a1e59b0b00d6403a5012b7
                                                          • Instruction Fuzzy Hash: 86310B25A18A9682E7509F7AE85452D6BA4FF88BC1F984130DF4E43B64DF3CE44AC718
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: BlockFrameHandler3::Unwindabortterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                          • String ID: csm$csm$csm
                                                          • API String ID: 4223619315-393685449
                                                          • Opcode ID: dcb3548c504605ccad87c1df068e82445ce8bfed626f824eb2c4e809fdb80efd
                                                          • Instruction ID: 52258cefde020b94d2549cce7fc375e86b14277ee76ae0645d1922b17c57c3c3
                                                          • Opcode Fuzzy Hash: dcb3548c504605ccad87c1df068e82445ce8bfed626f824eb2c4e809fdb80efd
                                                          • Instruction Fuzzy Hash: 55D18E72A08B428AEB209F69D4402AD77A0FB49FD8F500275EF8D57B95DF38E591D700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Replicator::operator[]
                                                          • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                                                          • API String ID: 3676697650-3207858774
                                                          • Opcode ID: 73310b6c18e80224c33410df5d9c8b136be81ee7f088e8962b8740eac16092a6
                                                          • Instruction ID: 65cbaff8fa1d9bdfe5fbced3f11813883d359bb8affa4622627cf013577596ff
                                                          • Opcode Fuzzy Hash: 73310b6c18e80224c33410df5d9c8b136be81ee7f088e8962b8740eac16092a6
                                                          • Instruction Fuzzy Hash: 0E916B72B08A8799FB209F28D4502F837A1AB94BC8F8541B2EF4D03695DF7DE645E740
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                          • String ID: P%
                                                          • API String ID: 2147705588-2959514604
                                                          • Opcode ID: 028f263e58f42d33d872b22938efc015f71aa7b4c996476cfe5add7d8b08dd36
                                                          • Instruction ID: e9c747987b85b0afa0ed168aec6bdbe81edfbb2a4b0122591a0c6c942ab87450
                                                          • Opcode Fuzzy Hash: 028f263e58f42d33d872b22938efc015f71aa7b4c996476cfe5add7d8b08dd36
                                                          • Instruction Fuzzy Hash: 9A51E626614BA186DA349F32A4181BAF7A1FB98F71F044221EBDE83694DF3CD485DB10
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$CallEnsureErr_FetchFunction_L_get_ex_dataObjectObject_SizeState_Weakref_
                                                          • String ID: Osiiiy#$read$write
                                                          • API String ID: 671906545-708132800
                                                          • Opcode ID: 4dedae0a1523f256da8ed8f48c6fc58330b6e0995d94e8687b53d423bc5f3eee
                                                          • Instruction ID: 729fe526d6799db086284abad88445f205891600ce564cdcae53e02eaf6e057b
                                                          • Opcode Fuzzy Hash: 4dedae0a1523f256da8ed8f48c6fc58330b6e0995d94e8687b53d423bc5f3eee
                                                          • Instruction Fuzzy Hash: 6B418332A08A8685EB688F39A85427D7FA0FB89BD0F484575CB5E13B54DF3CE446C708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_Unicode_$ArgumentCheckDigitErr_PositionalReadyString
                                                          • String ID: a unicode character$argument 1$digit$not a digit
                                                          • API String ID: 3305933226-4278345224
                                                          • Opcode ID: 3217a924504a57fe459749e66487c061ed53d5ecb5f468087b61bf9f04998d2c
                                                          • Instruction ID: b7a862267bb2bf9f65cf8584baeebf7ab426cd671ade0d685d604ed2802ea5c9
                                                          • Opcode Fuzzy Hash: 3217a924504a57fe459749e66487c061ed53d5ecb5f468087b61bf9f04998d2c
                                                          • Instruction Fuzzy Hash: E5212B61A08B4791EF129B29E8445BD2360EF44FC8F984635DB2E8767CDF2CE455C310
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocEval_Thread$Err_FormatSave$ArgsCallObject_RestoreStringUnicode_memcpy
                                                          • String ID: password callback must return a string$password cannot be longer than %d bytes
                                                          • API String ID: 1551476282-1265974473
                                                          • Opcode ID: b9ad5b883f70c21d53e302c230b13f6c4ffb0a1d091fcce54eaa940bff9ffee8
                                                          • Instruction ID: 37c7336ec47f1dc2e85f2a3b644bddc33dc7f7559a5eef80110c6baa812d0e32
                                                          • Opcode Fuzzy Hash: b9ad5b883f70c21d53e302c230b13f6c4ffb0a1d091fcce54eaa940bff9ffee8
                                                          • Instruction Fuzzy Hash: AB217C35A08A4685EBA49F39E85897C3BA0EB45BD4F884131DB1E02B98CF3CE456C784
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_ArgumentErr_SizeStringUnicode_
                                                          • String ID: No cipher can be selected.$argument$embedded null character$set_ciphers$str
                                                          • API String ID: 4155279725-2765033273
                                                          • Opcode ID: cbc34ef1a02719620d127c326886b9fe1fcc69ff5d4ca4366160a565347b9524
                                                          • Instruction ID: 8a3a194e7155ee5cb49432f7c8d6d4c5d1a62db2f93b37be12db3289788ecb6c
                                                          • Opcode Fuzzy Hash: cbc34ef1a02719620d127c326886b9fe1fcc69ff5d4ca4366160a565347b9524
                                                          • Instruction Fuzzy Hash: 28212E65A08A4691EE508F39E89017D2B60FF84BD4F985131DB2E476A4DF6CE49BC308
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                          • String ID:
                                                          • API String ID: 349153199-0
                                                          • Opcode ID: 8bc07dac1d2a15841653c24e65cbf90d53687740eca8f36c6e0f4d9ec23f2963
                                                          • Instruction ID: 4f00322f59e667c285259c5da04062c1f04f1bf7f12921d837472e2ae1118990
                                                          • Opcode Fuzzy Hash: 8bc07dac1d2a15841653c24e65cbf90d53687740eca8f36c6e0f4d9ec23f2963
                                                          • Instruction Fuzzy Hash: 23819A21E1C64386FA54AF7E94412BDBA90AF897C0FD84535EB0C87796DF3CE9478608
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                          • String ID:
                                                          • API String ID: 349153199-0
                                                          • Opcode ID: 5ae4ae1fad975d5487a8dd9099fd26104a61e4c8513e68d9fc499fd676c40ec1
                                                          • Instruction ID: 0af64d35c462a26704f3911a49c3b3935d4b568d034bbfa949a079977f58ed9d
                                                          • Opcode Fuzzy Hash: 5ae4ae1fad975d5487a8dd9099fd26104a61e4c8513e68d9fc499fd676c40ec1
                                                          • Instruction Fuzzy Hash: 8F81A021E08B4745FE56AB6D984127D2290AF49BC0F5C4235DB6D877BEDE3CFA458200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID:
                                                          • API String ID: 2943138195-0
                                                          • Opcode ID: 3cac31fbce2037cca8b65a6457a1f6e1f72e09754060cc87a73fdfbcf94b07ef
                                                          • Instruction ID: df7ebd3fe1f5275230f1c6a7f82641149e5efcbab67909d516bf4097f7e8f458
                                                          • Opcode Fuzzy Hash: 3cac31fbce2037cca8b65a6457a1f6e1f72e09754060cc87a73fdfbcf94b07ef
                                                          • Instruction Fuzzy Hash: 6D712A72B18A46ADEB10DF68D4911EC33B1AB44BCCB804872DF1D67A99DF38D619D390
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Module_$FromModuleSpecTypeType_$State
                                                          • String ID:
                                                          • API String ID: 1138651315-0
                                                          • Opcode ID: 47cdc940ff4b91a51c86818dd6ced2d78f07b15e551b4ece380ee1e2cec1c294
                                                          • Instruction ID: 91c1594dd3a3115e97d344d03bbe4ce4645366aaea8a4d511306d15d14642b96
                                                          • Opcode Fuzzy Hash: 47cdc940ff4b91a51c86818dd6ced2d78f07b15e551b4ece380ee1e2cec1c294
                                                          • Instruction Fuzzy Hash: BF310A25B59B4796EF549F3DA95152D26A0BF0ABC0F985A30CB0E47754EF3CE0268248
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
                                                          • API String ID: 2943138195-1464470183
                                                          • Opcode ID: 50e8110e92645124a6d82ffc9330fdaa6dc52167fa44e73d911cd3f80f86a47a
                                                          • Instruction ID: 192f0ea64de39892614b19ff632c7d0c9d8ba57bc134f08d81acd4e55f60497f
                                                          • Opcode Fuzzy Hash: 50e8110e92645124a6d82ffc9330fdaa6dc52167fa44e73d911cd3f80f86a47a
                                                          • Instruction Fuzzy Hash: 5F515832E09A5399FB10CB6AE8805BC37B2BB14BC8F9040B5DF4D17A99DF39A544E700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_KeywordsObject_SizeTrueUnicode_Unpack
                                                          • String ID: argument 'txt'$embedded null character$str$txt2obj
                                                          • API String ID: 3371007025-2001486153
                                                          • Opcode ID: 959f5737da16641b00553c8e7d233da7cdfdf94c9ae612db7a25b7a40e44e655
                                                          • Instruction ID: c7dd318d380db3a0371677011e4310be8d02ac6c4d824b405a1761e55608b536
                                                          • Opcode Fuzzy Hash: 959f5737da16641b00553c8e7d233da7cdfdf94c9ae612db7a25b7a40e44e655
                                                          • Instruction Fuzzy Hash: 4B319222A0CA4395EA608F29E4502BD6B60FB95BD4F984131DB6E47694DF3CE44BC708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentErr_KeywordsL_get_finishedL_session_reusedSizeStringUnicode_Unpackstrcmp
                                                          • String ID: argument 'cb_type'$embedded null character$get_channel_binding$str$tls-unique
                                                          • API String ID: 2734880604-851902044
                                                          • Opcode ID: 1f7a693b08fb8d66b148374fa4710b4b7c030c21cb8cd7b43a613a48802ec21d
                                                          • Instruction ID: ae84c2ba013ad66d7d5fb1c3d0b9c158597ea310a6a958280d4c1b04d408d30d
                                                          • Opcode Fuzzy Hash: 1f7a693b08fb8d66b148374fa4710b4b7c030c21cb8cd7b43a613a48802ec21d
                                                          • Instruction Fuzzy Hash: C731AF21A08A5286EA608F3DE4405B86B60FF55BD0F984235DF1D07BA4DF3CE84BC708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Unicode_$Arg_$ArgumentCompareReadyStringWith$CheckPositionalSubtypeType_
                                                          • String ID: argument 1$argument 2$normalize$str
                                                          • API String ID: 3621440800-1320425463
                                                          • Opcode ID: 94348148c340fa5468beab9ef1746397c69e42e894d14843631ab3fa4ea44381
                                                          • Instruction ID: 5e13afef2bcb961bac91ce23a6c014cabe9c73927e3886c6dfa478e9eeb20d19
                                                          • Opcode Fuzzy Hash: 94348148c340fa5468beab9ef1746397c69e42e894d14843631ab3fa4ea44381
                                                          • Instruction Fuzzy Hash: 64212F61A18B8691EA528B1DA84467D2750AF45BD8FAC4331DB6E567FCCF2CE446C310
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_ModuleModule_StateType_$CheckErr_KeywordsLong_OccurredPositional
                                                          • String ID: _SSLContext
                                                          • API String ID: 2062694701-1468230856
                                                          • Opcode ID: a7d274fb358438f1be0fb2a29868ff8fe6ad0857d5f4556286ed11194ea03964
                                                          • Instruction ID: 2106ff9a79e47c0bc36b72c9133a2060bbec6d45de899667dfac29e5e628f7c8
                                                          • Opcode Fuzzy Hash: a7d274fb358438f1be0fb2a29868ff8fe6ad0857d5f4556286ed11194ea03964
                                                          • Instruction Fuzzy Hash: 34216D61B09A1685EA50AF3AE8442BD6B60EF49FD0F984434DB1D43B64DF3CE84B8348
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentReadyUnicode_$CheckPositional
                                                          • String ID: argument 1$argument 2$is_normalized$str
                                                          • API String ID: 396090033-184702317
                                                          • Opcode ID: 083d934e8de19c9f3ecc87de63ad9be438488cb32d0c3822875fb99c87d5c9cf
                                                          • Instruction ID: 1dc277153e6d2cf3c58c76205152071c9df4254c24a7628d56f9e16c34fa9183
                                                          • Opcode Fuzzy Hash: 083d934e8de19c9f3ecc87de63ad9be438488cb32d0c3822875fb99c87d5c9cf
                                                          • Instruction Fuzzy Hash: A9212C21A08B8695EF518B59E8846BD3760AF54FD8F584331EB6E476BCCF2CE54AC310
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocErr_StringX_callback_ctrl
                                                          • String ID: not a callable object$sni_callback cannot be set on TLS_CLIENT context
                                                          • API String ID: 3136334877-1539510184
                                                          • Opcode ID: 4fd7f80077f1759e6f4afa11edbea34fd88629746f410f677fb886db3138ed84
                                                          • Instruction ID: 00d7665e524a14d5f8e78e721c224f815aa46830fe56ca5caffb01aa37913f07
                                                          • Opcode Fuzzy Hash: 4fd7f80077f1759e6f4afa11edbea34fd88629746f410f677fb886db3138ed84
                                                          • Instruction Fuzzy Hash: 36211931A18A06C6EB509F39D89467C3760FF88BD8F945536DB5E46668CF3CE44AC708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FromInternStringUnicode_$Module_State
                                                          • String ID: library$reason$verify_code$verify_message
                                                          • API String ID: 1970222510-435783180
                                                          • Opcode ID: 1402c12357f8a8a74b39a311a053b1d6e57728cfe69972c1f2afc845fee4e05e
                                                          • Instruction ID: 0be6818d923b3b5238074dd7e167709450b876e6851487027499ce5b97ac0f75
                                                          • Opcode Fuzzy Hash: 1402c12357f8a8a74b39a311a053b1d6e57728cfe69972c1f2afc845fee4e05e
                                                          • Instruction Fuzzy Hash: 0401FB2091AB0780EE659F78A85427C2BA0BF28B90F984535CA0DC53A5EF3CA14EC318
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID: -$:$f$p$p
                                                          • API String ID: 3215553584-2013873522
                                                          • Opcode ID: 6485ef080591767760fe67f9caec812fff4e1ba5c20858478bd9f0fbec74de2f
                                                          • Instruction ID: 95ff3ae406755393466d112469a1b7d323fed17433884e8319897231c1bf3863
                                                          • Opcode Fuzzy Hash: 6485ef080591767760fe67f9caec812fff4e1ba5c20858478bd9f0fbec74de2f
                                                          • Instruction Fuzzy Hash: 93129261E48A4386FBA0DB19E054279E791FF45F78F944236D6C9866E4EF3CED908B00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                          • String ID: csm$csm$csm
                                                          • API String ID: 211107550-393685449
                                                          • Opcode ID: aad8d4203d0b1849c4fce47835e3c613ec0ba3b35d99662ed70f641d37e67567
                                                          • Instruction ID: 59b567ac5a80a0f04c648e9b350b19dbb1a831d5b7eee4a7394540bfbadba9e8
                                                          • Opcode Fuzzy Hash: aad8d4203d0b1849c4fce47835e3c613ec0ba3b35d99662ed70f641d37e67567
                                                          • Instruction Fuzzy Hash: 21E1BE73A087928AE7219F38D4843AD77A0FB44B98F144275EF8D57A96CF38E581E700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                                          • API String ID: 2943138195-2239912363
                                                          • Opcode ID: 0e84257edd8271f32b759845b73cd3eefe07970f5e22a962a9d02e38f5861642
                                                          • Instruction ID: 38437e0c07e1d14015ac009dfcf568d13c2dd3ba31268a612ccadcb5a22e8a4f
                                                          • Opcode Fuzzy Hash: 0e84257edd8271f32b759845b73cd3eefe07970f5e22a962a9d02e38f5861642
                                                          • Instruction Fuzzy Hash: C7514972E18B5298FB528B68E8412BC77B0BF08B88F4441B6DF4D12B99DF7CA144E710
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                          • API String ID: 2030045667-3659356012
                                                          • Opcode ID: fe0539693312307a6548d1b6f9691386f436f5edd5898c8b8ef1b4374cb7018a
                                                          • Instruction ID: 6bdf0ec1ca5633ce4051ee18f72d52e1d1420df51a3c2ef20fbdb4288cb4dd45
                                                          • Opcode Fuzzy Hash: fe0539693312307a6548d1b6f9691386f436f5edd5898c8b8ef1b4374cb7018a
                                                          • Instruction Fuzzy Hash: 35419E25B88E4642EA149B63A8421BAE791FF44FE4F444235DD1D87BA5EF3CF8058300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_L_is_init_finishedL_set_sessionN_freeString
                                                          • String ID: Cannot set session after handshake.$Cannot set session for server-side SSLSocket.$Session refers to a different SSLContext.$Value is not a SSLSession.
                                                          • API String ID: 2514955158-3160731334
                                                          • Opcode ID: ed5b4e7d2d943de9a6add9e8ab532b976d9486503f624a5ae1c8bd460d17f373
                                                          • Instruction ID: 4177349f340e3d2a2a097330abbcc5178d89342fddab6c9fbba91d662495a97c
                                                          • Opcode Fuzzy Hash: ed5b4e7d2d943de9a6add9e8ab532b976d9486503f624a5ae1c8bd460d17f373
                                                          • Instruction Fuzzy Hash: 0A212B61A18A4681EA18CF7EE48013D2BA1FB84BC4F945131DB1D87AA5DF7CE497C748
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_ParseSizeTuple_$Buffer_Err_ReleaseStringmemset
                                                          • String ID: _ssl._SSLSocket.read requires 1 to 2 arguments$n:read$nw*:read
                                                          • API String ID: 2062789907-3684439920
                                                          • Opcode ID: 4d9f674cb8f01c2ec8c7eb491a0306551e557c933bd5ac34a25333a9ad965d85
                                                          • Instruction ID: 21495b30c74c98a9bb533fc7c22226ada10682848821f9159731bccd1893a1ec
                                                          • Opcode Fuzzy Hash: 4d9f674cb8f01c2ec8c7eb491a0306551e557c933bd5ac34a25333a9ad965d85
                                                          • Instruction Fuzzy Hash: 45215322B18A4A91EB20DF3AE8446AD7761FB88BC1F948131DB5D43764DF3CD94AC704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentErr_KeywordsSizeStringUnicode_Unpack
                                                          • String ID: argument 'store_name'$embedded null character$enum_crls$str
                                                          • API String ID: 2966986319-2641223161
                                                          • Opcode ID: edebcfdd8289f7a9c3fc563b68228b3e132f1c0e94ef5d0d028ad48f2d59ef7b
                                                          • Instruction ID: ddf3cac7d6f2b1ce2fdff880e60635d8f07415af6ff6315cf9495aef7ef8d81c
                                                          • Opcode Fuzzy Hash: edebcfdd8289f7a9c3fc563b68228b3e132f1c0e94ef5d0d028ad48f2d59ef7b
                                                          • Instruction Fuzzy Hash: 9A219C61A08B4685EE509F38E45426D6BA1FF45BD0FD81631DB6E033A4EF3CE44AC708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentErr_KeywordsSizeStringUnicode_Unpack
                                                          • String ID: argument 'store_name'$embedded null character$enum_certificates$str
                                                          • API String ID: 2966986319-2881692381
                                                          • Opcode ID: 53f086db60f9b04d6a2f02615ecfc5c48306b52590faff6202af7552c9614c75
                                                          • Instruction ID: 72102b66e54792f0e2c5ec669cab16580b73730478f4b923717b22cd19ca2ff8
                                                          • Opcode Fuzzy Hash: 53f086db60f9b04d6a2f02615ecfc5c48306b52590faff6202af7552c9614c75
                                                          • Instruction Fuzzy Hash: F9217C61A08B4685EE508F39E45067A7BA0FB44BE0F945235DB1D437A4EF3DE88AC708
                                                          APIs
                                                          • SSL_is_init_finished.LIBSSL-3(?,?,00000000,00007FF8B8B28FBA), ref: 00007FF8B8B28FF4
                                                          • PyErr_SetString.PYTHON311(?,?,00000000,00007FF8B8B28FBA), ref: 00007FF8B8B2900F
                                                          • SSL_get1_peer_certificate.LIBSSL-3(?,?,00000000,00007FF8B8B28FBA), ref: 00007FF8B8B2901D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_L_get1_peer_certificateL_is_init_finishedString
                                                          • String ID: handshake not done yet
                                                          • API String ID: 1333720006-2620869922
                                                          • Opcode ID: 79220f5fe6ea8fc6b2c70bdc56a1d20f8411fd76aa474a053c1e0f70df4ce9f8
                                                          • Instruction ID: b28312c11c8e8c415e8f963969a7b76517296db57248df2ce7480a92203e6112
                                                          • Opcode Fuzzy Hash: 79220f5fe6ea8fc6b2c70bdc56a1d20f8411fd76aa474a053c1e0f70df4ce9f8
                                                          • Instruction Fuzzy Hash: EE211D21A08A5A81EA149F3EE95443E2B60BF88FD4F980131DF0E87774DF2DE4578308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Bytes_Err_FormatFromL_get_finishedL_get_peer_finishedL_session_reusedSizeStringstrcmp
                                                          • String ID: '%s' channel binding type not implemented$tls-unique
                                                          • API String ID: 797867279-2744131590
                                                          • Opcode ID: 21146a2112b2ad7085c28b3d21b7c7292de9ba5a06dba59da6786d702b1b3277
                                                          • Instruction ID: 1bff89cd121aed374d73e74afc404482bd15845e10de6a508f9340f0ce9cc121
                                                          • Opcode Fuzzy Hash: 21146a2112b2ad7085c28b3d21b7c7292de9ba5a06dba59da6786d702b1b3277
                                                          • Instruction Fuzzy Hash: BB113061B08A4681EB209F3DE89037D2760BF98BC4F984135CB4D47A65DF2CE45A8704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Buffer_$Arg_ArgumentBufferContiguousObject_Releasememset
                                                          • String ID: argument$contiguous buffer$write
                                                          • API String ID: 365628853-2056178395
                                                          • Opcode ID: cc61c2993cc4346274ecbbec02443e0238b67ce1d0f3286e9f77d67aad708846
                                                          • Instruction ID: d83da8c12f27e96562a98ca5abacd12700683316ad49533328429018df3dd4bb
                                                          • Opcode Fuzzy Hash: cc61c2993cc4346274ecbbec02443e0238b67ce1d0f3286e9f77d67aad708846
                                                          • Instruction Fuzzy Hash: CF11B622B08A4681EB109F39E8542BD6760FB49BC4FD48135DB4D47664EF3CE54AC744
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Buffer_$Arg_ArgumentBufferContiguousObject_Releasememset
                                                          • String ID: _set_alpn_protocols$argument$contiguous buffer
                                                          • API String ID: 365628853-4024966138
                                                          • Opcode ID: 1392f1b1f5bd8f698a70ceaa6f21d61dbeb0dfddf111f35acff58b2a9a9a809f
                                                          • Instruction ID: 80eba8103a2cdd27e3becf8794d4906e19e3b922bf48967e4eb87ee8316692a9
                                                          • Opcode Fuzzy Hash: 1392f1b1f5bd8f698a70ceaa6f21d61dbeb0dfddf111f35acff58b2a9a9a809f
                                                          • Instruction Fuzzy Hash: DE119326B08A4AC1EB209F39E8542BD6760FB89BC4F988235DB4D43664DF3CE54AC704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Buffer_$Arg_ArgumentBufferContiguousObject_Releasememset
                                                          • String ID: argument$contiguous buffer$write
                                                          • API String ID: 365628853-2056178395
                                                          • Opcode ID: c8bb77e8611b4a60aad0a4be1a272d77f1b9e7e505abc08805f5cc3e93e89f8b
                                                          • Instruction ID: 132c94fccdd8194f29fc99da28e44a79426c26b0320c6b5f5d6e1eb566a998ef
                                                          • Opcode Fuzzy Hash: c8bb77e8611b4a60aad0a4be1a272d77f1b9e7e505abc08805f5cc3e93e89f8b
                                                          • Instruction Fuzzy Hash: 5F119322B08B4A82EB109F39E8546AD6760FB89BC4F948171DB4D43664DF3CD94AC704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_Mem_$FormatFreeMallocMemory
                                                          • String ID: protocols longer than %u bytes
                                                          • API String ID: 2903777688-895981740
                                                          • Opcode ID: 39fea56072f3fada9465762c4a1f8beb2e0cdbcfd0e0a9ed28ff2a549860dcfe
                                                          • Instruction ID: b9ea864125872282a7a16d8938386caf70a54c163dc61154bf08f058448a8129
                                                          • Opcode Fuzzy Hash: 39fea56072f3fada9465762c4a1f8beb2e0cdbcfd0e0a9ed28ff2a549860dcfe
                                                          • Instruction Fuzzy Hash: 2311DA66A18B4A82EB149F3EE85402C2B70FB89BD4F944535CF2E47764DF2CE4668344
                                                          APIs
                                                          • PyErr_Format.PYTHON311(?,?,?,?,00000000,00007FF8B8B2680E), ref: 00007FF8B8B268A6
                                                          • PyType_GetModule.PYTHON311(?,?,?,?,00000000,00007FF8B8B2680E), ref: 00007FF8B8B268BE
                                                          • PyModule_GetState.PYTHON311(?,?,?,?,00000000,00007FF8B8B2680E), ref: 00007FF8B8B268CC
                                                          • PyErr_SetString.PYTHON311(?,?,?,?,00000000,00007FF8B8B2680E), ref: 00007FF8B8B268DD
                                                          • BIO_write.LIBCRYPTO-3(?,?,?,?,00000000,00007FF8B8B2680E), ref: 00007FF8B8B268F0
                                                          • PyType_GetModuleState.PYTHON311(?,?,?,?,00000000,00007FF8B8B2680E), ref: 00007FF8B8B268FE
                                                            • Part of subcall function 00007FF8B8B261C8: ERR_peek_last_error.LIBCRYPTO-3 ref: 00007FF8B8B261E0
                                                            • Part of subcall function 00007FF8B8B261C8: ERR_clear_error.LIBCRYPTO-3 ref: 00007FF8B8B26209
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_ModuleStateType_$FormatModule_O_writeR_clear_errorR_peek_last_errorString
                                                          • String ID: cannot write() after write_eof()$string longer than %d bytes
                                                          • API String ID: 11717643-118187971
                                                          • Opcode ID: 19f2ded5fd9fb4c8a1b9f1457ca27de781a3e5e88470d39e3a5cd985d7c12adc
                                                          • Instruction ID: 1b483987ed2d3534bb9804c462653b994f770fcd5923d9409f48cb00402ec85d
                                                          • Opcode Fuzzy Hash: 19f2ded5fd9fb4c8a1b9f1457ca27de781a3e5e88470d39e3a5cd985d7c12adc
                                                          • Instruction Fuzzy Hash: 59112B61B1890AC1EB149F39D85417C2BA0FB85BD4F984535CB0E8B6A4DF3DE48BC708
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: L_sk_num$L_get_ciphersL_get_client_ciphersL_sk_findL_sk_valueList_
                                                          • String ID:
                                                          • API String ID: 1815754784-0
                                                          • Opcode ID: e1125bb4d621d2ba6061570ce7d485875dac23ddf1f437e6e1f39d5413b124bd
                                                          • Instruction ID: 52bd1f9a80b8eb4de1fa0de954d64648927b11594b74bf4261941fa8ade869fb
                                                          • Opcode Fuzzy Hash: e1125bb4d621d2ba6061570ce7d485875dac23ddf1f437e6e1f39d5413b124bd
                                                          • Instruction Fuzzy Hash: 7131F721A09B4A81EB199F3AA95453D6AE0BF89FD1F980434CF4E87754EF3CE4578348
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: L_sk_num$L_freeL_get_ciphersL_newL_sk_valueList_R_clear_errorR_peek_last_error
                                                          • String ID:
                                                          • API String ID: 722909353-0
                                                          • Opcode ID: 0755245ea7af00cb45e25f8db7755cfce4f2b330fd28a278580c78b5433de7c0
                                                          • Instruction ID: f862c8a32a2b13b155a40ec8ca78ff47fac98dcca309c1457a47cdcbc59c52a4
                                                          • Opcode Fuzzy Hash: 0755245ea7af00cb45e25f8db7755cfce4f2b330fd28a278580c78b5433de7c0
                                                          • Instruction Fuzzy Hash: A5211721A09B4686EA159F7EA85413D6AA0EF88FC0F984434CB4E43754EF7CE40A870C
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileHeader$ExceptionFindInstanceRaiseTargetType
                                                          • String ID: Access violation - no RTTI data!$Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                                                          • API String ID: 1852475696-928371585
                                                          • Opcode ID: 4ef8ad2c729168d00ef0645f383a1968f42c4eb1f6a8b3717fe5ffb80b324514
                                                          • Instruction ID: 950325911d2b9327a3654f96a0f9d5ad9a8bcb44b9dd2235e6b0919bcecd3fbd
                                                          • Opcode Fuzzy Hash: 4ef8ad2c729168d00ef0645f383a1968f42c4eb1f6a8b3717fe5ffb80b324514
                                                          • Instruction Fuzzy Hash: 09516B62A18A8792EA20CB68EA906B96361FF44FC4F404571EF8D47A65EF3DE505E700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Unicode_$Arg_ArgumentFromReadyStringSubtypeType_
                                                          • String ID: a unicode character$argument$category
                                                          • API String ID: 2803103377-2068800536
                                                          • Opcode ID: a6d96ab8f4d74e2785bc45c139f4dad4c1c002ec39197cd78705e508cfcb3221
                                                          • Instruction ID: 257fb1867ec301439a0c88f37d80bb9532675f865db686fe433700968fc9f388
                                                          • Opcode Fuzzy Hash: a6d96ab8f4d74e2785bc45c139f4dad4c1c002ec39197cd78705e508cfcb3221
                                                          • Instruction Fuzzy Hash: B1517F61B08B5692EF5A8B1DD8902BD23A1EB44BC4F5C4235DBAE477A8DF2DE845C310
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentErr_KeywordsLong_OccurredSubtypeType_Unpack
                                                          • String ID: _wrap_bio$argument 'incoming'$argument 'outgoing'
                                                          • API String ID: 1983060003-586963342
                                                          • Opcode ID: a3a91b4470d632ea0959dd1c880afab1b37646f1eae7cf510c8b9dc2dea6cdaa
                                                          • Instruction ID: d1d53e70330ffbd60fc32846310c795a005f0572d3c43189750856dc6616b7d4
                                                          • Opcode Fuzzy Hash: a3a91b4470d632ea0959dd1c880afab1b37646f1eae7cf510c8b9dc2dea6cdaa
                                                          • Instruction Fuzzy Hash: CC419F62A09B9282EE509F6AE44066D7BA4FB49BD4F84043ADF5C43B54DF3CE4968308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Unicode_$Arg_ArgumentFromReadyStringSubtypeType_
                                                          • String ID: a unicode character$argument$bidirectional
                                                          • API String ID: 2803103377-2110215792
                                                          • Opcode ID: 36da06cb25986c62c4c3f8f899b6a59008b4eccd6e6682e03f445f584b43c37d
                                                          • Instruction ID: c49fabea1b8324885ae3e6c988d11b4d838ba366f7a026ed89d45798e6f59ca4
                                                          • Opcode Fuzzy Hash: 36da06cb25986c62c4c3f8f899b6a59008b4eccd6e6682e03f445f584b43c37d
                                                          • Instruction Fuzzy Hash: C341A261B1874282EF568B1DD89437D23A1EB44BC4F5D4239DB6E476BCDE3DE8458340
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF8BA2471A3,?,?,00000000,00007FF8BA246FD4,?,?,?,?,00007FF8BA246D11), ref: 00007FF8BA247069
                                                          • GetLastError.KERNEL32(?,?,?,00007FF8BA2471A3,?,?,00000000,00007FF8BA246FD4,?,?,?,?,00007FF8BA246D11), ref: 00007FF8BA247077
                                                          • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF8BA2471A3,?,?,00000000,00007FF8BA246FD4,?,?,?,?,00007FF8BA246D11), ref: 00007FF8BA247090
                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF8BA2471A3,?,?,00000000,00007FF8BA246FD4,?,?,?,?,00007FF8BA246D11), ref: 00007FF8BA2470A2
                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF8BA2471A3,?,?,00000000,00007FF8BA246FD4,?,?,?,?,00007FF8BA246D11), ref: 00007FF8BA247110
                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF8BA2471A3,?,?,00000000,00007FF8BA246FD4,?,?,?,?,00007FF8BA246D11), ref: 00007FF8BA24711C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                                          • String ID: api-ms-
                                                          • API String ID: 916704608-2084034818
                                                          • Opcode ID: 76e9ed00015fa7378e2762435fe1c6674923b12dca3248f544122840abba5d3b
                                                          • Instruction ID: 4efddd9899aa022dc13c524ee5ba553284b138d0da538d39b0c6f3b01c417e33
                                                          • Opcode Fuzzy Hash: 76e9ed00015fa7378e2762435fe1c6674923b12dca3248f544122840abba5d3b
                                                          • Instruction Fuzzy Hash: 99318F21F1AB4391EE169B1AA8105B56794FF08FE4F196575DF2E0BB80EE3DE544A300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FromStringUnicode_$S_snprintfSizeSubtypeType_memcpy
                                                          • String ID: $%04X
                                                          • API String ID: 762632776-4013080060
                                                          • Opcode ID: efaac3812b1e45b0806d1ffd24ca6100d0016fb643bf3bb04f79384b0d54b902
                                                          • Instruction ID: f797298f46846d27a43bdd4364b9a336e08be7e8a31ad6ca1259ecf1c9a69ff5
                                                          • Opcode Fuzzy Hash: efaac3812b1e45b0806d1ffd24ca6100d0016fb643bf3bb04f79384b0d54b902
                                                          • Instruction Fuzzy Hash: 1A316E62A08B8141EE628B19E8543BD67A1FF49BD4F584335EB7E47AE8DF2CE5458300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: E_print_exErr_O_freeO_newO_s_memStringX509_
                                                          • String ID: failed to allocate BIO$strict
                                                          • API String ID: 220268057-2811890329
                                                          • Opcode ID: f3bd8290070eb6edf1ca0f46686a835670ffb4ee5c39d9d56ef1657fad3d7d60
                                                          • Instruction ID: 0b4511a72f7c830b8c2a07390392085f4be52c45f05d790dc108304fa98a695b
                                                          • Opcode Fuzzy Hash: f3bd8290070eb6edf1ca0f46686a835670ffb4ee5c39d9d56ef1657fad3d7d60
                                                          • Instruction Fuzzy Hash: 60114C61B18A4785EA409F3AB81452EAB60BF89FC0F986030DF4E47B25DF3CE0478708
                                                          APIs
                                                          • OBJ_obj2nid.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B214EA
                                                          • OBJ_nid2sn.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B214FC
                                                          • OBJ_nid2ln.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B21507
                                                            • Part of subcall function 00007FF8B8B21558: OBJ_obj2txt.LIBCRYPTO-3 ref: 00007FF8B8B2159D
                                                            • Part of subcall function 00007FF8B8B21558: PyUnicode_FromStringAndSize.PYTHON311 ref: 00007FF8B8B215C3
                                                          • _Py_BuildValue_SizeT.PYTHON311(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B21535
                                                          • PyErr_Format.PYTHON311(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B23633
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Size$BuildErr_FormatFromJ_nid2lnJ_nid2snJ_obj2nidJ_obj2txtStringUnicode_Value_
                                                          • String ID: Unknown object$issN
                                                          • API String ID: 1805764990-847857892
                                                          • Opcode ID: 36dc22c37b80143fa571bc994d527e926e6cf506b95b83dc09d1e569a5f0b79d
                                                          • Instruction ID: 53c05b22c6e653e4835c482fec4d1c4fb4ee33682b69f4a653b972053e586c1f
                                                          • Opcode Fuzzy Hash: 36dc22c37b80143fa571bc994d527e926e6cf506b95b83dc09d1e569a5f0b79d
                                                          • Instruction Fuzzy Hash: 76115B25B18B4685EA109F3AF80406DABA0BB88FD0F884135DF4D87B24DF7CE44A8708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_ArgumentErr_FromLongLong_OccurredReadyUnicode_
                                                          • String ID: a unicode character$argument$combining
                                                          • API String ID: 3097524968-4202047184
                                                          • Opcode ID: 6ee8f634c8bf377dd992d2f0ff6affb9e81d614e22d3a0a0852f92623d6c53f6
                                                          • Instruction ID: 7422297fe686b9d2ec2cdc5ce5d05c44e5df7c8f3d19507e53b3e8097d0015f7
                                                          • Opcode Fuzzy Hash: 6ee8f634c8bf377dd992d2f0ff6affb9e81d614e22d3a0a0852f92623d6c53f6
                                                          • Instruction Fuzzy Hash: 8C014420E0874742EE569B69A84427D2290EF49BD8F585335EB7E476BDDF3CE4858300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_ArgumentErr_FromLongLong_OccurredReadyUnicode_
                                                          • String ID: a unicode character$argument$mirrored
                                                          • API String ID: 3097524968-4001128513
                                                          • Opcode ID: 77cb7ad6de355ad8668d3817cb236b2b5105f7e73bd8a590f5e838a9add7c01f
                                                          • Instruction ID: e69412e8b1446bf9cb7027c875d6a00e4a54b0899de981ca7cdfd3d7e85530f7
                                                          • Opcode Fuzzy Hash: 77cb7ad6de355ad8668d3817cb236b2b5105f7e73bd8a590f5e838a9add7c01f
                                                          • Instruction Fuzzy Hash: AD018420A0874341EE569B2DAA4417C2350AF49BE8F4C5334EB2E476BDDF3CE8448304
                                                          APIs
                                                          • PyErr_SetString.PYTHON311(?,?,00000000,00007FF8B8B2A82D), ref: 00007FF8B8B2A86D
                                                          • OBJ_nid2obj.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2A82D), ref: 00007FF8B8B2A879
                                                          • PyErr_Format.PYTHON311(?,?,00000000,00007FF8B8B2A82D), ref: 00007FF8B8B2A89B
                                                          • PyModule_GetState.PYTHON311(?,?,00000000,00007FF8B8B2A82D), ref: 00007FF8B8B2A8A6
                                                            • Part of subcall function 00007FF8B8B214C8: OBJ_obj2nid.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B214EA
                                                            • Part of subcall function 00007FF8B8B214C8: OBJ_nid2sn.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B214FC
                                                            • Part of subcall function 00007FF8B8B214C8: OBJ_nid2ln.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B21507
                                                            • Part of subcall function 00007FF8B8B214C8: _Py_BuildValue_SizeT.PYTHON311(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B21535
                                                          • ASN1_OBJECT_free.LIBCRYPTO-3(?,?,00000000,00007FF8B8B2A82D), ref: 00007FF8B8B2A8BD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_$BuildFormatJ_nid2lnJ_nid2objJ_nid2snJ_obj2nidModule_SizeStateStringT_freeValue_
                                                          • String ID: NID must be positive.$unknown NID %i
                                                          • API String ID: 278606715-2656559464
                                                          • Opcode ID: 781b65defdf33130c69221b13b130f0b8eb1561745a09ecb98b7b2dcb7949935
                                                          • Instruction ID: a9b6001711bd459f92cbc45d17c9ec8021539a37404fa540bde90206bc96c5b6
                                                          • Opcode Fuzzy Hash: 781b65defdf33130c69221b13b130f0b8eb1561745a09ecb98b7b2dcb7949935
                                                          • Instruction Fuzzy Hash: 07011724F0CA4781EA048F3EE85453D6B61AF89BD4F985175CB0E4BB25DF2CE44B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_O_ctrlO_freeO_newO_s_memO_set_flagsString
                                                          • String ID: failed to allocate BIO
                                                          • API String ID: 68942223-3472608418
                                                          • Opcode ID: b4841f7cb48ad26e6a7df2d2d5ff6b3eb66126841573f36bf7c96289b451f945
                                                          • Instruction ID: 60a1836cbc02090c160ed9e3a033c5f3c2d4eb42858cfb5effc54dc3d389323b
                                                          • Opcode Fuzzy Hash: b4841f7cb48ad26e6a7df2d2d5ff6b3eb66126841573f36bf7c96289b451f945
                                                          • Instruction Fuzzy Hash: 30014C61B08A0782EB189F39F91463D6BA0FF89BC5FA85134CB1E46754DF3CE44A8308
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abort$AdjustPointer
                                                          • String ID:
                                                          • API String ID: 1501936508-0
                                                          • Opcode ID: 65b26e5f074ca0aafdff43cbb52cf6556557cf4e92b090b05be647d0b4ff5bec
                                                          • Instruction ID: f5799c9498a2da6d9f9e2241bf69edfd60325f826d00daff20a1d7ca0f9b41d2
                                                          • Opcode Fuzzy Hash: 65b26e5f074ca0aafdff43cbb52cf6556557cf4e92b090b05be647d0b4ff5bec
                                                          • Instruction Fuzzy Hash: FE517C22A0DF5381FA69DB2ED45463963A4BF54FC4B0A84B5DF4E06795DF2CE842E300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abort$AdjustPointer
                                                          • String ID:
                                                          • API String ID: 1501936508-0
                                                          • Opcode ID: d568fcbafcd5d9e8e83e95e63f5b62363508f79f2b2b670005157146ca98b55e
                                                          • Instruction ID: 7f72b5c37c942687c209fb45d295043fc594dc58c3ab21786f07d471afbef8a7
                                                          • Opcode Fuzzy Hash: d568fcbafcd5d9e8e83e95e63f5b62363508f79f2b2b670005157146ca98b55e
                                                          • Instruction Fuzzy Hash: FE519E22A0EA4391EA65DB5E94446386398FF54FC0F4A84B5DF4E06785DF2CF882AB10
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: From$StringUnicode_$DeallocLongLong_R_get_bitsR_get_nameR_get_versionTuple_
                                                          • String ID:
                                                          • API String ID: 4201023408-0
                                                          • Opcode ID: abd7184fc6f38644f9f77e97a2ae4beadb791884bfb1fff1d07f4d283dc1fe0e
                                                          • Instruction ID: 1768941c3a756f73309d7153645ae378812630ec47ff4735e8f1e313b4f22648
                                                          • Opcode Fuzzy Hash: abd7184fc6f38644f9f77e97a2ae4beadb791884bfb1fff1d07f4d283dc1fe0e
                                                          • Instruction Fuzzy Hash: 6E212164A1DB0682EE559F3DA95423C6BA0AF48BC0F881434DB0E47754DF3CA4468308
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$Object_$L_freeTrack
                                                          • String ID:
                                                          • API String ID: 970091570-0
                                                          • Opcode ID: e3d824a64c23f5aa5d9beb24dd4d29c7206220b1af59a27399d64d8b1e93205b
                                                          • Instruction ID: 947387645a0fa4c7e03e51863f20d93410939bbf0f589757f90abfd2f059b3f7
                                                          • Opcode Fuzzy Hash: e3d824a64c23f5aa5d9beb24dd4d29c7206220b1af59a27399d64d8b1e93205b
                                                          • Instruction Fuzzy Hash: 53110D36E0AA06C5FE59AF79D55413C6B60AF59FE4F984530CB1E02A64CF2DD48B8318
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Mem_$MallocSubtypeType_$DeallocErr_FreeMemory
                                                          • String ID:
                                                          • API String ID: 4139299733-0
                                                          • Opcode ID: 28f3761f3b9b36c355cab414f80724fd73af126df89ae3bbe0a4b4c216283ad1
                                                          • Instruction ID: 41d5fae2dc18a93da9e7066b7ed6bb54e4d976420950b2643824e91ec4451d53
                                                          • Opcode Fuzzy Hash: 28f3761f3b9b36c355cab414f80724fd73af126df89ae3bbe0a4b4c216283ad1
                                                          • Instruction Fuzzy Hash: 72D19B72A0CB5282EE328B1D944467D73A1FB457C4F5C0331DBAE466A8EE7EE841C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID: {for
                                                          • API String ID: 2943138195-864106941
                                                          • Opcode ID: ad201dfe96a96ae0dc6555201844fc758e8e36effd4b63a30410ed7392a88b68
                                                          • Instruction ID: 7bbe88f6f5bfeebaaa2a86b6760b2ae2096421c5058e40fed11b4649e59e3e51
                                                          • Opcode Fuzzy Hash: ad201dfe96a96ae0dc6555201844fc758e8e36effd4b63a30410ed7392a88b68
                                                          • Instruction Fuzzy Hash: CD511972A08A86A9F7019F28D4413E877A5EB44B88F8484B1EB4C07B99DF7CE655D340
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentErr_KeywordsLong_OccurredUnpack
                                                          • String ID: _wrap_socket$argument 'sock'
                                                          • API String ID: 3416574803-3343203394
                                                          • Opcode ID: 2ce16b05ca7704c2f44a8d2a6420770c9f586b2a5aac0beda5ab974c2b11777e
                                                          • Instruction ID: d4c520b438079b2f25eee8ef0a88ed840dffc10a04955a90a3fa6fef0266c81b
                                                          • Opcode Fuzzy Hash: 2ce16b05ca7704c2f44a8d2a6420770c9f586b2a5aac0beda5ab974c2b11777e
                                                          • Instruction Fuzzy Hash: 9E416D22B09A42C2EA61DF2AA84066E6BA4FF49BD5F844435DF4C47754DF3CE45ACB0C
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: NameName::atol
                                                          • String ID: `template-parameter$void
                                                          • API String ID: 2130343216-4057429177
                                                          • Opcode ID: 1a349dcf90f4e371f1810c8875e562b3843b42aeee856190ba29246ab6ec8260
                                                          • Instruction ID: 5cb6c1a04484e6980bd0e1ec20f9770ce1436dda0e46485cd77d59e82a3e8cbf
                                                          • Opcode Fuzzy Hash: 1a349dcf90f4e371f1810c8875e562b3843b42aeee856190ba29246ab6ec8260
                                                          • Instruction Fuzzy Hash: 4D413422F08B5698FB00DBA8D8512FC23B1BB48BC8F9451B5DF0D26A59DF7CA645E340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: J_obj2txt$FromMallocMem_SizeStringUnicode_
                                                          • String ID:
                                                          • API String ID: 2822617359-0
                                                          • Opcode ID: 98683cb0245338a9515093b87542fdb12a4b1f49cc3e46ef3079e3984ffcab4a
                                                          • Instruction ID: 60211ab6496755d1c6af9ba971da853cf36187905d60fc646d14bc60a983b160
                                                          • Opcode Fuzzy Hash: 98683cb0245338a9515093b87542fdb12a4b1f49cc3e46ef3079e3984ffcab4a
                                                          • Instruction Fuzzy Hash: 90316D21B1CA4645EB618F3AA81567EAA94AF89BC4F884031DF0E47765DF3CE00B8708
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+Replicator::operator[]
                                                          • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                          • API String ID: 1405650943-2211150622
                                                          • Opcode ID: cc95b6719b0dfac949915fa95283a824f9a94d2610a8c8b5f10b5de908d24d67
                                                          • Instruction ID: 18b2d0aadd78b6abb03db3ed102fcd26e239d881f1c0c97594ce8c55968ae4e9
                                                          • Opcode Fuzzy Hash: cc95b6719b0dfac949915fa95283a824f9a94d2610a8c8b5f10b5de908d24d67
                                                          • Instruction Fuzzy Hash: 71414AB2E18B429CFB118B6CD8502BC77A1BB08B88F9545B1DF4D12765EF7DA540E740
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID: char $int $long $short $unsigned
                                                          • API String ID: 2943138195-3894466517
                                                          • Opcode ID: 041e2dffe1b489bc893f09ff0a4f423b3d9eca273271e83df22d622629981137
                                                          • Instruction ID: e74d11a10f0740477c1660ad3ab79769629d6a4d13e475f86713824d3f83a753
                                                          • Opcode Fuzzy Hash: 041e2dffe1b489bc893f09ff0a4f423b3d9eca273271e83df22d622629981137
                                                          • Instruction Fuzzy Hash: D3313872E18A52C8FB168B6DD8501B83BB1BB09B88F4481B5DF4D06BA8DE39E504E700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_N_get_id$ArgumentCallInternalmemcmp
                                                          • String ID: D:\a\1\s\Modules\_ssl.c
                                                          • API String ID: 2709062062-132925792
                                                          • Opcode ID: c2a8348eb9e6693873ab47f985ca8bfd22968f8ee8dfdbdba6370d880fe16349
                                                          • Instruction ID: 374e365cb58069fa4b9d473631f0c448837127b22d738b08ede560d35a9418bc
                                                          • Opcode Fuzzy Hash: c2a8348eb9e6693873ab47f985ca8bfd22968f8ee8dfdbdba6370d880fe16349
                                                          • Instruction Fuzzy Hash: EE314422A0D64681EA588F3DD49513CAAA0FF4ABC4F944536DB4F477B4DF2EE8438708
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Bytes_O_ctrl_pending$DeallocFromModuleO_readResizeSizeStateStringType_
                                                          • String ID:
                                                          • API String ID: 3878297189-0
                                                          • Opcode ID: dfee8e4881b599a4f54a2ab518126c7bb26f6b3ec1a7d89fa806b26f09941069
                                                          • Instruction ID: a17b1f82299394ae41398186c8892c757315a0f0cf724c2e94aa4c8f53a68b64
                                                          • Opcode Fuzzy Hash: dfee8e4881b599a4f54a2ab518126c7bb26f6b3ec1a7d89fa806b26f09941069
                                                          • Instruction Fuzzy Hash: 93216265B08B4282EB149F39E98003D6AA1FF89BC4FA84935DF0E82764DF2DE4468704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentCheckPositionalReadyUnicode_
                                                          • String ID: a unicode character$argument 1$decimal
                                                          • API String ID: 3545102714-2474051849
                                                          • Opcode ID: f4a4db4005ce5b44fbbedd951a978a9de4f901ebc22dc2e68f9535657243f817
                                                          • Instruction ID: 6db48bdfff64a910ff765f6b73c9d2c170cffa730270b0ea286e06f9c2d02f78
                                                          • Opcode Fuzzy Hash: f4a4db4005ce5b44fbbedd951a978a9de4f901ebc22dc2e68f9535657243f817
                                                          • Instruction Fuzzy Hash: E3213B31A08B8295EE519B59E8411AD7360EF44BC4F9C4231EB6D4777DDF2CE556C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentCheckPositionalReadyUnicode_
                                                          • String ID: a unicode character$argument 1$numeric
                                                          • API String ID: 3545102714-2385192657
                                                          • Opcode ID: 9cf334a25039c3b0788d85340cb18b310c84a749129293f830eaee71995b6e63
                                                          • Instruction ID: b139418c8cc91e698fc1cada0cd6f952ce16daaeead0de9be9b41aeb22a565e9
                                                          • Opcode Fuzzy Hash: 9cf334a25039c3b0788d85340cb18b310c84a749129293f830eaee71995b6e63
                                                          • Instruction Fuzzy Hash: B1214D31A08B8685EF919B1AE8411AD3360EB44FC8F5C4231EB6E47779DF2CE595C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_$ArgumentCheckPositionalReadyUnicode_
                                                          • String ID: a unicode character$argument 1$name
                                                          • API String ID: 3545102714-4190364640
                                                          • Opcode ID: 98823aa8ffd1578c5263bbca0bedab94c0d76701b0ad0a7228cb953a239c43b9
                                                          • Instruction ID: 3bce4591a30269ca6c18cde1d8a0bb9fc8c655b9567232e32dc8d0a4366baedf
                                                          • Opcode Fuzzy Hash: 98823aa8ffd1578c5263bbca0bedab94c0d76701b0ad0a7228cb953a239c43b9
                                                          • Instruction Fuzzy Hash: 3D214D31A08B8685EE519F5AE8412AE3760EB44BC8F584231EBAD4777DDF2CE555C300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: X509_$Arg_M_clear_flagsM_get_flagsM_set_flagsParse_SizeX_get0_param
                                                          • String ID: y
                                                          • API String ID: 3791563005-3247811837
                                                          • Opcode ID: a6f7386a19a810f4f7fe1bb19cf5cb670392074563fc389e9f70955544fdafe1
                                                          • Instruction ID: b100441bb5b0615c09a47b90bc48c9498cecc7ea0348a2d3e2f85655ab3f80db
                                                          • Opcode Fuzzy Hash: a6f7386a19a810f4f7fe1bb19cf5cb670392074563fc389e9f70955544fdafe1
                                                          • Instruction Fuzzy Hash: A4116025B0CA5282F7508F7AE45013E6BA0BF88BD4F944135DB5D436A8DF7CE44A8B09
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_Err_Parse_SizeWarnX_clear_optionsX_get_optionsX_set_options
                                                          • String ID: ssl.OP_NO_SSL*/ssl.OP_NO_TLS* options are deprecated
                                                          • API String ID: 476201610-2795599882
                                                          • Opcode ID: b9e0414bf8dfc93871d24a40954165cf8dc8189ab5ee71978250bacf9efb8c41
                                                          • Instruction ID: 00f5d1c0a7908cd88f66ca46392e7d647da9d641153236d2642f39104a556de3
                                                          • Opcode Fuzzy Hash: b9e0414bf8dfc93871d24a40954165cf8dc8189ab5ee71978250bacf9efb8c41
                                                          • Instruction Fuzzy Hash: BC114265A08B0682EB109F3DF48417D6B71EF84BD1F985435DB6E47764DF2CE44A8704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ConverterDeallocErr_FormatJ_sn2nidR_clear_errorR_peek_last_errorUnicode_X_ctrl
                                                          • String ID: unknown elliptic curve name %R
                                                          • API String ID: 3792718242-553976147
                                                          • Opcode ID: 6639daee6b3a6ecb1720df9ca2e8b5f1aefabcd95c7d83a5a5ea68336d1a1e57
                                                          • Instruction ID: 16041ccd24422653e48aa377b6f80e28264fc107bd187f315c90e3cdb2045ed4
                                                          • Opcode Fuzzy Hash: 6639daee6b3a6ecb1720df9ca2e8b5f1aefabcd95c7d83a5a5ea68336d1a1e57
                                                          • Instruction Fuzzy Hash: BC115131A0C94681EB108F79E84013EAB61FF84BD4F944031DB4D87A69DF7CE44AC709
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: X_set_msg_callback$Callable_CheckDeallocErr_String
                                                          • String ID: not a callable object
                                                          • API String ID: 3435843511-3332612890
                                                          • Opcode ID: 95106ae4221e8b19012489c333b5f2e66c47aa29e76483eaedf5bd8f66dace62
                                                          • Instruction ID: 61230e54237e122395cd411d45b140cb5196910a0c33022774a9d95d234310f9
                                                          • Opcode Fuzzy Hash: 95106ae4221e8b19012489c333b5f2e66c47aa29e76483eaedf5bd8f66dace62
                                                          • Instruction Fuzzy Hash: C2114431A0990682EB189F3DE94423C2BA1FF88FD4F944531DB5E46954DF3CE44B8308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_Err_Parse_SizeStringX_set_num_tickets
                                                          • String ID: SSLContext is not a server context.$failed to set num tickets.$value must be non-negative
                                                          • API String ID: 2130650243-3995814857
                                                          • Opcode ID: 9555f25f47c46f5ccf57cac2100dd865d1e80091c718ee7adcb5dad95f2e815e
                                                          • Instruction ID: e7d61c6cd665fe57c1a8ea47ed2e7f5463fa7b3878e39cd90f92147308c43536
                                                          • Opcode Fuzzy Hash: 9555f25f47c46f5ccf57cac2100dd865d1e80091c718ee7adcb5dad95f2e815e
                                                          • Instruction Fuzzy Hash: 44018460E0CA06C1EA248F7DE8801FC2B60BF45BD0FE41235CB1D862A4DF2CE48AC308
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$NameName::
                                                          • String ID:
                                                          • API String ID: 168861036-0
                                                          • Opcode ID: 80a690cc5bf4571957900b2ba371d1f0df44bd22a0b18b914ff66e25afa9163e
                                                          • Instruction ID: 10d55651892aeda376d7aa32beb1f80ebe33b7c9f95dd434b121209df34d54f1
                                                          • Opcode Fuzzy Hash: 80a690cc5bf4571957900b2ba371d1f0df44bd22a0b18b914ff66e25afa9163e
                                                          • Instruction Fuzzy Hash: F4717772E18A5299F711CF69E8902BC37A1BB44B88F9080B5DF1D17A99DF7EE441E340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: free$EntryInterlockedListNamePush__unmallocstrcpy_s
                                                          • String ID:
                                                          • API String ID: 3741236498-0
                                                          • Opcode ID: 0fa2fcead297943da074142d2fbec92c84cd60449e30d9ad217028345c3eb4d3
                                                          • Instruction ID: faf21833ac4bc5c1e7527b3c5da9c81a929dfa0666292319ce628f69199fac23
                                                          • Opcode Fuzzy Hash: 0fa2fcead297943da074142d2fbec92c84cd60449e30d9ad217028345c3eb4d3
                                                          • Instruction Fuzzy Hash: 4D31D622B19BA290EF15DF29AA1456963A0FF48FE0F599571DF2D03780EE3DE445E300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocInsertL_get1_peer_certificateL_get_peer_cert_chainList_
                                                          • String ID:
                                                          • API String ID: 710524685-0
                                                          • Opcode ID: 28eff91168d659fc0ad5f7a6fb4e4da58eab0f778793f6e716cba1adfe9d5eef
                                                          • Instruction ID: 467edf880b508be80a5ad77419294d8d68cc04a137b575bd55c25527d1502cd9
                                                          • Opcode Fuzzy Hash: 28eff91168d659fc0ad5f7a6fb4e4da58eab0f778793f6e716cba1adfe9d5eef
                                                          • Instruction Fuzzy Hash: 81215E32A09A5681EA159F3E985413D2BA1FF88FE0F884535DB2E07B94DF3CE4578308
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: List_$DeallocItemL_sk_numL_sk_valueX509_up_ref
                                                          • String ID:
                                                          • API String ID: 2540853196-0
                                                          • Opcode ID: a29fb3de930c74fd7dfb48e481c500c0c0289393999c6b46459c04c3a7227b1b
                                                          • Instruction ID: 364b9418c988fa243d00a81812e717b8929b6c9ddec099cfb3cc5202d68fbe03
                                                          • Opcode Fuzzy Hash: a29fb3de930c74fd7dfb48e481c500c0c0289393999c6b46459c04c3a7227b1b
                                                          • Instruction Fuzzy Hash: 3611A221A05B5685EA1A8F3AA84406D6BA1FF89FE4F894931DF5D07B94DF3CE4478304
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A5E7
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A61D
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A64A
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A65B
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A66C
                                                          • SetLastError.KERNEL32(?,?,?,00007FF615A343FD,?,?,?,?,00007FF615A3979A,?,?,?,?,00007FF615A3649F), ref: 00007FF615A3A687
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Value$ErrorLast
                                                          • String ID:
                                                          • API String ID: 2506987500-0
                                                          • Opcode ID: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
                                                          • Instruction ID: 517795d1abf381fa0427b58fd4b4c4e2e02d04a8ddd00eab3aae9a3bbec5f86a
                                                          • Opcode Fuzzy Hash: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
                                                          • Instruction Fuzzy Hash: 59113820F88E524AFA94E7215661139E2825F88FB8F144734D93ECB6F6DF7CAC414701
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$Eval_Thread$O_free_allRestoreSave
                                                          • String ID:
                                                          • API String ID: 86175192-0
                                                          • Opcode ID: 46ed533e6c83a35b49080775b07df26f1aab52a1a543c17bfc3a09b58e663565
                                                          • Instruction ID: b665c329a9f43b389003a2371a376cea9fec23b162fe79c7460f1663f7b46da8
                                                          • Opcode Fuzzy Hash: 46ed533e6c83a35b49080775b07df26f1aab52a1a543c17bfc3a09b58e663565
                                                          • Instruction Fuzzy Hash: 3E110C72A19A06D7FB598F79EA5873D27A4FF48BA4F480534CB0D46950CF3DE4AA8304
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abort$CallEncodePointerTranslator
                                                          • String ID: MOC$RCC
                                                          • API String ID: 2889003569-2084237596
                                                          • Opcode ID: 93ffbb8a8c38b724cb13d32310db34e78531563cac4ba1370c621256939a6833
                                                          • Instruction ID: 95230984921b04941742dbec05d325a4491256879aa9769ad7f61aace1ffb7cb
                                                          • Opcode Fuzzy Hash: 93ffbb8a8c38b724cb13d32310db34e78531563cac4ba1370c621256939a6833
                                                          • Instruction Fuzzy Hash: 3D91B373A08B928AEB51CB69E8502AD7BA0FB44BC8F104179EF8D17B55DF38E195D700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                                                          • API String ID: 2943138195-757766384
                                                          • Opcode ID: 01adbf8b940f63687fb8b05ad2c3f4aee868cfabe9c87335b9cb2bee01f92b8d
                                                          • Instruction ID: 6627ebf2c447e95ccaa3caa502da5f6436e5011ed09ef6966f42fc8b46614e83
                                                          • Opcode Fuzzy Hash: 01adbf8b940f63687fb8b05ad2c3f4aee868cfabe9c87335b9cb2bee01f92b8d
                                                          • Instruction Fuzzy Hash: 1B7122B2A08A4399FB148B2CD9501B867A5BF05BC4F8485B5CF4D56B99EF3DE160E300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abort$CallEncodePointerTranslator
                                                          • String ID: MOC$RCC
                                                          • API String ID: 2889003569-2084237596
                                                          • Opcode ID: 8e034f92e989b9960bc08160daca0ef1833c14a7b13808a87468da7d70181806
                                                          • Instruction ID: 39b4c57ad71f77890c198cc931a162f177303b44a188efb1b89fb6099df38287
                                                          • Opcode Fuzzy Hash: 8e034f92e989b9960bc08160daca0ef1833c14a7b13808a87468da7d70181806
                                                          • Instruction Fuzzy Hash: 5E619032908BC686DB619B19E4403AAB7A0FB85BD4F044275EF8D07B95DF7CE194CB00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileHeader
                                                          • String ID: MOC$RCC$csm$csm
                                                          • API String ID: 104395404-1441736206
                                                          • Opcode ID: 5815091cf7d4bf77be2b6452b49c3696097c0f3c73df3e225fc204c9d15c1510
                                                          • Instruction ID: 5c7e9ef0ca995d3b03b2864a7dfe23b93fa3899433409351eda37a5b2e4fb6e4
                                                          • Opcode Fuzzy Hash: 5815091cf7d4bf77be2b6452b49c3696097c0f3c73df3e225fc204c9d15c1510
                                                          • Instruction Fuzzy Hash: B8519B32A09A5397EAA49F29954017E36A0FF48FC4F1401B1EF8D47B85DF3CE961AB41
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DoubleErr_Float_FromNumericStringSubtypeType_Unicode_
                                                          • String ID: not a numeric character
                                                          • API String ID: 1034370217-2058156748
                                                          • Opcode ID: ae5864331190d99266549655542a2a8f2e04feb98f737cbb9499cc14618bbe38
                                                          • Instruction ID: 0b6936912749da9f2d4ccaa957868ba142327a938942ac9696c53a489f32a973
                                                          • Opcode Fuzzy Hash: ae5864331190d99266549655542a2a8f2e04feb98f737cbb9499cc14618bbe38
                                                          • Instruction Fuzzy Hash: 04114F25E08B4681FE968B2DA85413D63A1AF44BD8F5C8331EB2F4667DDF2CF8858250
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DecimalDigitErr_FromLongLong_StringSubtypeType_Unicode_
                                                          • String ID: not a decimal
                                                          • API String ID: 3750391552-3590249192
                                                          • Opcode ID: 456184b784fa7efc8fe9d8897fb77cbbb081413c450d27b41a848b68105fcfc3
                                                          • Instruction ID: 9899c60d10310d7c9e72bd2456b6269401024bc9ce63e04e47a84003b32c0734
                                                          • Opcode Fuzzy Hash: 456184b784fa7efc8fe9d8897fb77cbbb081413c450d27b41a848b68105fcfc3
                                                          • Instruction Fuzzy Hash: 7D112A21B08B4281FE168B2AE85413D63A1AF84BC4F4D8635EB2F8667CDF2CE8558310
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocErr_L_set_L_set_msg_callbackStringSubtypeType_
                                                          • String ID: The value must be a SSLContext
                                                          • API String ID: 40619448-677980480
                                                          • Opcode ID: 394ac2fa61f267975ade5a47f813cdf12de2fcbd668e233ddbe45757f84e86c3
                                                          • Instruction ID: be099607d6d74f7adbea27023a5c3f9a5c80dbe88747e28ed62ab54b93144578
                                                          • Opcode Fuzzy Hash: 394ac2fa61f267975ade5a47f813cdf12de2fcbd668e233ddbe45757f84e86c3
                                                          • Instruction Fuzzy Hash: C7111CB6A08A4681DB149F3AE98402D3BB1FB88FD5B549131DF5D47768CF2CD45AC344
                                                          APIs
                                                          • OBJ_txt2obj.LIBCRYPTO-3 ref: 00007FF8B8B21480
                                                          • PyModule_GetState.PYTHON311 ref: 00007FF8B8B21495
                                                            • Part of subcall function 00007FF8B8B214C8: OBJ_obj2nid.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B214EA
                                                            • Part of subcall function 00007FF8B8B214C8: OBJ_nid2sn.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B214FC
                                                            • Part of subcall function 00007FF8B8B214C8: OBJ_nid2ln.LIBCRYPTO-3(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B21507
                                                            • Part of subcall function 00007FF8B8B214C8: _Py_BuildValue_SizeT.PYTHON311(?,?,?,?,?,00007FF8B8B214A6), ref: 00007FF8B8B21535
                                                          • ASN1_OBJECT_free.LIBCRYPTO-3 ref: 00007FF8B8B214AC
                                                          • PyErr_Format.PYTHON311 ref: 00007FF8B8B23614
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: BuildErr_FormatJ_nid2lnJ_nid2snJ_obj2nidJ_txt2objModule_SizeStateT_freeValue_
                                                          • String ID: unknown object '%.100s'
                                                          • API String ID: 2376969911-3113687063
                                                          • Opcode ID: b5d45e1b3159c0210a2dcfbd056b4fed1a47d8c8d60440e740920665be194752
                                                          • Instruction ID: fafe4a92b4a8f244cf27bd956dfb730b9cb9e621ce9b54ea845176d29bc1f7e3
                                                          • Opcode Fuzzy Hash: b5d45e1b3159c0210a2dcfbd056b4fed1a47d8c8d60440e740920665be194752
                                                          • Instruction Fuzzy Hash: 74F01D61B1CA4781EA04CF3AA95443DAA91AF89FD0F8C8130DF1E47B28DF2CE0468704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocErr_FormatFromModuleO_newO_s_memStateStringType_Unicode_X509_get_subject_name
                                                          • String ID: <%s '%U'>
                                                          • API String ID: 652521511-3496504151
                                                          • Opcode ID: bfad1c9a2df2547f65aed7cc543a789bee4611461373e23b73206238e9355141
                                                          • Instruction ID: dcd087f2f93bbd834363a1373ab3fa7361ef6f8a754965c92a9427a3bf17bd02
                                                          • Opcode Fuzzy Hash: bfad1c9a2df2547f65aed7cc543a789bee4611461373e23b73206238e9355141
                                                          • Instruction Fuzzy Hash: B101F625A09A8681EA049F2AE94402D6B61FB48FD4F986431DF4E47769DF3CE486C304
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_ArgumentReadyUnicode_
                                                          • String ID: a unicode character$argument$east_asian_width
                                                          • API String ID: 1875788646-3913127203
                                                          • Opcode ID: e1dea5a4efee597cabc79f5f4f9b1c361292688d97fad454cab5bbac9e71014d
                                                          • Instruction ID: 9e261907e053b732d9122e27ea7be52a1da8b7503110389f1735b50a0bb15492
                                                          • Opcode Fuzzy Hash: e1dea5a4efee597cabc79f5f4f9b1c361292688d97fad454cab5bbac9e71014d
                                                          • Instruction Fuzzy Hash: BD01A260A0878381EE51AB29A94017D2360EF46BD4F485231EBAE4667CDE3CE4858380
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_ArgumentReadyUnicode_
                                                          • String ID: a unicode character$argument$decomposition
                                                          • API String ID: 1875788646-2471543666
                                                          • Opcode ID: ac2962689f343f1b3e1879047209e348276c37b5dff3c3435d3d8175ead54011
                                                          • Instruction ID: c2ab42dfc2e2e5e723aad71462865760902326737084aa58ab064730e8af2ab0
                                                          • Opcode Fuzzy Hash: ac2962689f343f1b3e1879047209e348276c37b5dff3c3435d3d8175ead54011
                                                          • Instruction Fuzzy Hash: 1B01D121B08B8381FE51CB19A8402BD2360AF48BD4F4C1231EB6E466BDDF7CE4898300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Mem_$Capsule_Err_FreeMallocMemory
                                                          • String ID: unicodedata._ucnhash_CAPI
                                                          • API String ID: 3673501854-3989975041
                                                          • Opcode ID: 1ac5af153bf2bbb2bda3b9d9d9136918d1f6bd182a880703478f12c765018ae7
                                                          • Instruction ID: e075eeb24635322f90e64878e1d62292ff1ff5e715e396a6e014088a269e6c12
                                                          • Opcode Fuzzy Hash: 1ac5af153bf2bbb2bda3b9d9d9136918d1f6bd182a880703478f12c765018ae7
                                                          • Instruction Fuzzy Hash: AAF01420A09B4291EE568B19A80017C72A4BF08BC8F4C1635CB6E0637CEE3CE1448360
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                          • Instruction ID: 996a73f0bfe029ec2f1c2ea4fb0f7b05c248e06a2d52a5cee8b65f6d548034d5
                                                          • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                          • Instruction Fuzzy Hash: 25F06261A59F0681EF108B64E4487799360AF85FB5F581736D66D861F4CF3CD849C310
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: NameName::$Name::operator+
                                                          • String ID:
                                                          • API String ID: 826178784-0
                                                          • Opcode ID: f125dc20a4fc2cff283c2e4d5124f38be857c51718d1d3c9008137230ed817e4
                                                          • Instruction ID: 2bce9aebfb46b9ba43fa1a099953f10d3adbbdb6d3464025026b805be5c0f058
                                                          • Opcode Fuzzy Hash: f125dc20a4fc2cff283c2e4d5124f38be857c51718d1d3c9008137230ed817e4
                                                          • Instruction Fuzzy Hash: A6415532A19B5398FB00CB2AE9901B837B4BB18BC4B9444B2EF4D53795DF39E955E300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CertStore$CloseOpen$Collection
                                                          • String ID:
                                                          • API String ID: 1995843185-0
                                                          • Opcode ID: bd11785bf98fe9174426880ce2bd286796db4b743bc5c2560542b8e3adf2f1d7
                                                          • Instruction ID: fdb839e6728e0e61aa044c19b74967ca958f355e999ead7a61780b9d3fddefe7
                                                          • Opcode Fuzzy Hash: bd11785bf98fe9174426880ce2bd286796db4b743bc5c2560542b8e3adf2f1d7
                                                          • Instruction Fuzzy Hash: 6C218332B1865586F714DF3AE865A6E6A51FB84BD0F884430CE0D03764DF3CE557C604
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _set_statfp
                                                          • String ID:
                                                          • API String ID: 1156100317-0
                                                          • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                          • Instruction ID: 8c00375e6a3182cfdc9756efab3e7f699c90e7ff99eb073456a55613ac92f26e
                                                          • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                          • Instruction Fuzzy Hash: 3411BF32ED8E0341F79411A9F466376D1406F56FB4F1D4734EA6E966F68F2CAC40C110
                                                          APIs
                                                          • FlsGetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A6BF
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A6DE
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A706
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A717
                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF615A398B3,?,?,00000000,00007FF615A39B4E,?,?,?,?,?,00007FF615A39ADA), ref: 00007FF615A3A728
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Value
                                                          • String ID:
                                                          • API String ID: 3702945584-0
                                                          • Opcode ID: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
                                                          • Instruction ID: a4c539fbde22c590053b2205852199ef3efebd6fe476f67bc90ee02192f06523
                                                          • Opcode Fuzzy Hash: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
                                                          • Instruction Fuzzy Hash: 2F116D20F88A5246FAD8D32556A1579E1926F98FB8E044334E93DCA6F6DF7CAC018700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: L_get_session
                                                          • String ID:
                                                          • API String ID: 1156357689-0
                                                          • Opcode ID: 412ab88cb6b3608a0184366fb7cd7560aecfe6a833c2579db5c50b705b4d490f
                                                          • Instruction ID: c8d60a8fb9f111b74ece9f6739d38c6895a0a3bb0d34122d24e2b4037fa6d90c
                                                          • Opcode Fuzzy Hash: 412ab88cb6b3608a0184366fb7cd7560aecfe6a833c2579db5c50b705b4d490f
                                                          • Instruction Fuzzy Hash: 4411E622A19B4681EA249F2AB46413D6BA0FB88FC0F980435DF4E03764DF2DE4478748
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DeallocObject_$N_freeTrack
                                                          • String ID:
                                                          • API String ID: 1683932209-0
                                                          • Opcode ID: 73466ddfc36bf957d1f27849d204b3954713433a3c8e205f38a25ddfc3ec53d8
                                                          • Instruction ID: 6fb0a73ecd7b54e0f024d01c4cfb0d2f977ba9aa59556d4852eb71727cc3cc01
                                                          • Opcode Fuzzy Hash: 73466ddfc36bf957d1f27849d204b3954713433a3c8e205f38a25ddfc3ec53d8
                                                          • Instruction Fuzzy Hash: 05F03A36E09A4681EA589F79E55413C6B60EF49FD4F884030CB0E0A621CF2DD49AC308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _invalid_parameter_noinfo
                                                          • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                          • API String ID: 3215553584-1196891531
                                                          • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                          • Instruction ID: 6a51c174f0d765dd3309aca0a35bd518829f5ebf650714d9449d9b68928a8dd0
                                                          • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                          • Instruction Fuzzy Hash: D181DA32DA890385FBE4CF29D110279A6A4AF12F6CF558271CA99D72B5EF2DEC018701
                                                          APIs
                                                            • Part of subcall function 00007FF8BA246E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8BA2429EE), ref: 00007FF8BA246E56
                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8BA24488B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abort
                                                          • String ID: $csm$csm
                                                          • API String ID: 4206212132-1512788406
                                                          • Opcode ID: bd14039b9dc44c48f3afba7226bd4a8f48c08aeb5fb2f86f7c5774b76e28317a
                                                          • Instruction ID: 37aea0310eb91b4fea4c0f065677be59fb0ceea9d51182bc560ea6ef1b850756
                                                          • Opcode Fuzzy Hash: bd14039b9dc44c48f3afba7226bd4a8f48c08aeb5fb2f86f7c5774b76e28317a
                                                          • Instruction Fuzzy Hash: 74718B32A08A8287DB618F29D5A077DABA0FB45FC8F048175DF8D47A89CF2CE551E740
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                          • String ID: csm$csm
                                                          • API String ID: 3896166516-3733052814
                                                          • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                          • Instruction ID: 4f69219a8bcea51ed3d2f4fbe79b06a84bf405d859bcef183dd9f661a0255bbb
                                                          • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                          • Instruction Fuzzy Hash: 81517132A48A828AEB648B339045278B691EF55FA4F148335DB5D87BE5CF3CE891C741
                                                          APIs
                                                            • Part of subcall function 00007FF8BA246E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8BA2429EE), ref: 00007FF8BA246E56
                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8BA2445DB
                                                          • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00007FF8BA2445EB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Frameabort$EmptyHandler3::StateUnwind
                                                          • String ID: csm$csm
                                                          • API String ID: 4108983575-3733052814
                                                          • Opcode ID: 08ef0bffa0d8dc861c4a01b7d2fd628c67e896dc6c26123b9582640005c51e48
                                                          • Instruction ID: da1fac4179437da111651e8712289eb98d6c9caeea835a4f0199125db6df8a62
                                                          • Opcode Fuzzy Hash: 08ef0bffa0d8dc861c4a01b7d2fd628c67e896dc6c26123b9582640005c51e48
                                                          • Instruction Fuzzy Hash: CE516D7290828387EF648B29955436876A0FB94FD9F148176DF8D47B95CF3CE4A1DB00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: NameName::
                                                          • String ID: %lf
                                                          • API String ID: 1333004437-2891890143
                                                          • Opcode ID: 7e0deb2cf17bd330c849068a4ca2fc9bc064bfcc9212df10860184869afe9d43
                                                          • Instruction ID: ddc02c1e9b2b4dbac188683ca6e4a4c0218f77b125cc686b6fa4bac8fb28cd33
                                                          • Opcode Fuzzy Hash: 7e0deb2cf17bd330c849068a4ca2fc9bc064bfcc9212df10860184869afe9d43
                                                          • Instruction Fuzzy Hash: B931BF71A0CB8785EB10DB29A8510BAB7A1BF55FC0F4482B6EF8E53791DE3CE541A700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message$ByteCharMultiWide
                                                          • String ID: Error$Error/warning (ANSI fallback)
                                                          • API String ID: 1878133881-653037927
                                                          • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                          • Instruction ID: 51c11ca983d5a56b14860e8cab357bc89f797b0cc5541e78ba16eef8ea252a50
                                                          • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                          • Instruction Fuzzy Hash: 3F116D72668F8581FA208B61F451BA9B364FF48F94F905236EA4D97664DF3CDA09C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Message$ByteCharMultiWide
                                                          • String ID: Error/warning (ANSI fallback)$Warning
                                                          • API String ID: 1878133881-2698358428
                                                          • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                          • Instruction ID: 2a019c74239c2c7fd815faa4ea7f23b616daffb490cce48f75354588fd08c458
                                                          • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                          • Instruction Fuzzy Hash: 8B119072668F8981FA208B21F451BA9B364FF44F94F905235DA4C87664CF3CDA04C700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_CheckErr_Long_OccurredPositional
                                                          • String ID: read
                                                          • API String ID: 3612027452-2555855207
                                                          • Opcode ID: 8a8e7eb9a6d2fd23c0527b5df7bfe1ba3a6bd226f027e0e78acf8f3acddc74f0
                                                          • Instruction ID: 9a62eb6060a2ea2d288a3db1a51882c3328af6dda3ad6f603355fc3191ed799e
                                                          • Opcode Fuzzy Hash: 8a8e7eb9a6d2fd23c0527b5df7bfe1ba3a6bd226f027e0e78acf8f3acddc74f0
                                                          • Instruction Fuzzy Hash: 8E01D631B14A5185EA50AF3AE8001AD7AA4EF85FD0F984135DF5D837A4CF3CE8528708
                                                          APIs
                                                          • PyErr_SetString.PYTHON311(?,?,?,?,?,00007FF8B7DE1EDC), ref: 00007FF8B7DE3B6F
                                                            • Part of subcall function 00007FF8B7DE1FD0: strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B7DE2008
                                                            • Part of subcall function 00007FF8B7DE1FD0: strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF8B7DE2026
                                                          • PyErr_Format.PYTHON311 ref: 00007FF8B7DE1F53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_strncmp$FormatString
                                                          • String ID: name too long$undefined character name '%s'
                                                          • API String ID: 3882229318-4056717002
                                                          • Opcode ID: 8b8c9c862c8556266a26c0415d30d38fd4fd6db163ae40366dde064f1277ed55
                                                          • Instruction ID: c2f1723670a7bb0bc2934306dec3ef93c6f341d97119aa6cbac27238f3534c52
                                                          • Opcode Fuzzy Hash: 8b8c9c862c8556266a26c0415d30d38fd4fd6db163ae40366dde064f1277ed55
                                                          • Instruction Fuzzy Hash: C111E276A18B4795EF018B1CD8442BC7361FB987C9F880531CB1E86278DF6DD549C750
                                                          APIs
                                                          • PyUnicode_InternFromString.PYTHON311(?,?,00000000,00007FF8B8B2A18B), ref: 00007FF8B8B2AA9B
                                                          • PyUnicode_InternFromString.PYTHON311(?,?,00000000,00007FF8B8B2A18B), ref: 00007FF8B8B2AAC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FromInternStringUnicode_
                                                          • String ID: pkcs_7_asn$x509_asn
                                                          • API String ID: 3337471625-3375957347
                                                          • Opcode ID: c237cb97dbbad94ae287de8b25dae0ba831a19de8f6c9387e5957410867ff6f9
                                                          • Instruction ID: cbb7560e26f745ade2767728ffc7650ff3552a1bee6d86c812370a1149a90454
                                                          • Opcode Fuzzy Hash: c237cb97dbbad94ae287de8b25dae0ba831a19de8f6c9387e5957410867ff6f9
                                                          • Instruction Fuzzy Hash: A6011E20E19E0780FE659F7DA89513827A0AF497D4F981535CB1E463A0EF3CB45BD308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_StringX_get_verify_callbackX_set_verify
                                                          • String ID: invalid value for verify_mode
                                                          • API String ID: 93861573-2668209411
                                                          • Opcode ID: 4856f5f7de021945ac99fd8d1e173b09ad5d2f51963348923486f7d074500968
                                                          • Instruction ID: c31770201b32602656d2543f0341d8bfe9f8da56af44019d0958f4ee6ae2050d
                                                          • Opcode Fuzzy Hash: 4856f5f7de021945ac99fd8d1e173b09ad5d2f51963348923486f7d074500968
                                                          • Instruction Fuzzy Hash: E9F06221F1CA0685EB558F7DE59813C2A60FF8ABD4FA84135CB1D476A4CF3DE44A8308
                                                          APIs
                                                            • Part of subcall function 00007FF8BA246E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8BA2429EE), ref: 00007FF8BA246E56
                                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8BA242A8E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abortterminate
                                                          • String ID: MOC$RCC$csm
                                                          • API String ID: 661698970-2671469338
                                                          • Opcode ID: 3ab94ae7472f91afbfb2fa40e8eaefdcfa6935c471aaf11af4776549d32657f7
                                                          • Instruction ID: e4aca3f5dcd241c1851cd99a78c1c5eb7369b40055d15a94e5b46cd1d832a055
                                                          • Opcode Fuzzy Hash: 3ab94ae7472f91afbfb2fa40e8eaefdcfa6935c471aaf11af4776549d32657f7
                                                          • Instruction Fuzzy Hash: 6AF04F32A1861785E7646B2AE28106D36A4FF4CFC0F1990B1DF4806652CF3CE491D701
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: DecodeErr_O_ctrlStringUnicode_
                                                          • String ID: Not a memory BIO
                                                          • API String ID: 3520065620-587638661
                                                          • Opcode ID: 64dfe8055ee3b1cd31987682b318179c1f452374172f5427dc3f21fadd9e4985
                                                          • Instruction ID: d0f6f116e00eee6f1f1f6eb23452d7814ecf1250fda4daa0921be6524268bcbd
                                                          • Opcode Fuzzy Hash: 64dfe8055ee3b1cd31987682b318179c1f452374172f5427dc3f21fadd9e4985
                                                          • Instruction Fuzzy Hash: 79F09065A29A4686EB04CF75E444B7D2B61EF85BC0F845131DF0E46A24DF3CE44A8704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: L_get_versionL_is_init_finishedstrcmp
                                                          • String ID: unknown
                                                          • API String ID: 1061301088-2904991687
                                                          • Opcode ID: eaffb4479277b7afc06a0f789e62f95ec0f0f56c5575d45baa8399530b0a07a3
                                                          • Instruction ID: e4ad0f7fba098074869e4145c206e7daf18382f225ff3561abcc2c04bf49960d
                                                          • Opcode Fuzzy Hash: eaffb4479277b7afc06a0f789e62f95ec0f0f56c5575d45baa8399530b0a07a3
                                                          • Instruction Fuzzy Hash: E4F0F811B0990A80EE199F7AA89053C2BA0EF48FD4F981431CF5D4A260DF2CE4978308
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: String$Bytes_Err_FromO_ctrlSize
                                                          • String ID: Not a memory BIO
                                                          • API String ID: 2349510700-587638661
                                                          • Opcode ID: d7394661b94f92f6a73cdb88a38c15a887adc7f5d70ad9ec87d922d267c36386
                                                          • Instruction ID: 68130131e1a7ea28e24da34c3ec1eeb4755f7d79de8fb52c90aeb6aa7dead4e7
                                                          • Opcode Fuzzy Hash: d7394661b94f92f6a73cdb88a38c15a887adc7f5d70ad9ec87d922d267c36386
                                                          • Instruction Fuzzy Hash: 98F05E65B2994682EB04CF79E984B7D27A1BF847C0FC45131DB4E46928CF3CE04E8704
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileWrite$ConsoleErrorLastOutput
                                                          • String ID:
                                                          • API String ID: 2718003287-0
                                                          • Opcode ID: 0739f85a4d911baae0561c1f2f5b651aa469f8b70ac1dc09fd50f765aaaafbc7
                                                          • Instruction ID: 5bb38ad559e3eb652253f41b8c1ba81e8bfe731770c929ba15db7d6376dec092
                                                          • Opcode Fuzzy Hash: 0739f85a4d911baae0561c1f2f5b651aa469f8b70ac1dc09fd50f765aaaafbc7
                                                          • Instruction Fuzzy Hash: FCD1D172B58A8589E750CF65D4402AC77B2FB48FACB144236CE5E97BA9DF38D916C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID:
                                                          • API String ID: 2943138195-0
                                                          • Opcode ID: cc076bc81e8f2d48ba6aefa04368e4e4f2bc5c7ef048a26b3748b4f62f7846b0
                                                          • Instruction ID: 29424758adb846d2623c34d3815c6ebc97dc9a37eb721087dc25896752a1d2c0
                                                          • Opcode Fuzzy Hash: cc076bc81e8f2d48ba6aefa04368e4e4f2bc5c7ef048a26b3748b4f62f7846b0
                                                          • Instruction Fuzzy Hash: 70912772E08A5399FB118B69D8403AC37B1FB04B88F5480B6DF4D17699DF7DA846E740
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: strncmp
                                                          • String ID: CJK UNIFIED IDEOGRAPH-$HANGUL SYLLABLE
                                                          • API String ID: 1114863663-87138338
                                                          • Opcode ID: 315690625b96ec968e0fd3bff09a411a7d33ab15bbea3d9f0de0a272eac0e1aa
                                                          • Instruction ID: f1fb8480b287719b9d8e15d5f1f9693a6fc7cad02c21362c027f84a667f18500
                                                          • Opcode Fuzzy Hash: 315690625b96ec968e0fd3bff09a411a7d33ab15bbea3d9f0de0a272eac0e1aa
                                                          • Instruction Fuzzy Hash: 6761E772B18B4246EA668B1DA80067E7652FF98BD0F484335EB6D476EDDF7CE6018700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+$Replicator::operator[]
                                                          • String ID:
                                                          • API String ID: 3863519203-0
                                                          • Opcode ID: 57265f9aaea93611d8ae4b0edf9f43af56394ecd72ecd9aef4b3b93798ee479d
                                                          • Instruction ID: 6b3100be82e900075b51567753f84b69ef8dce81179964bd339649905c6039b4
                                                          • Opcode Fuzzy Hash: 57265f9aaea93611d8ae4b0edf9f43af56394ecd72ecd9aef4b3b93798ee479d
                                                          • Instruction Fuzzy Hash: F7413572E08B8299FB01CF68D8403AC3BA0BB48B88F948476DF4D57759DF78A445D750
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5b3ecd30306d68961cb9200b597a246700d375a60376d027b0040ec7de20f592
                                                          • Instruction ID: 84c45826d54a0c1966394972e332cb624d948eb7dc3eb21101a3265365d71e36
                                                          • Opcode Fuzzy Hash: 5b3ecd30306d68961cb9200b597a246700d375a60376d027b0040ec7de20f592
                                                          • Instruction Fuzzy Hash: D121BF26A0DB8682EB24CF38E44576A76A0FF48BA4F944631CF5D43B94EF3CE0468604
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Eval_Thread$ErrorFromL_get_errorL_pendingLastLongLong_R_clear_errorR_peek_last_errorRestoreSave_errno
                                                          • String ID:
                                                          • API String ID: 1598009871-0
                                                          • Opcode ID: d2a7d47461be732cc6a1ae5316264d943ef1faa4ed19ea55c1e4dde8012ed04b
                                                          • Instruction ID: 06f2a687887de8b83691e3c570f3ac0553606a365ba7d4f800bdb0e89d0915f2
                                                          • Opcode Fuzzy Hash: d2a7d47461be732cc6a1ae5316264d943ef1faa4ed19ea55c1e4dde8012ed04b
                                                          • Instruction Fuzzy Hash: A0115E26A08F858AD710DF39A40406EAB20FB89BD5F944235EF4D17B59DF3CD4828B84
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                          • String ID:
                                                          • API String ID: 2933794660-0
                                                          • Opcode ID: 74344bb322e65ea4bb1ed5ded81f371800f489492d84809563666ba838173471
                                                          • Instruction ID: 09e2533a691a4fb4053497b93ffcbdbb750bddc2665bfac3e2903a1777cfe59d
                                                          • Opcode Fuzzy Hash: 74344bb322e65ea4bb1ed5ded81f371800f489492d84809563666ba838173471
                                                          • Instruction Fuzzy Hash: 7D115222B14F018AEB00CF64E8542B933A4F719B98F441E31DF6D46BA4DF7DE1589340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                          • String ID:
                                                          • API String ID: 2933794660-0
                                                          • Opcode ID: 1174b9e05e0ec077f58f84e71c627ec51327c8a58e7600726c525f8141592f8c
                                                          • Instruction ID: bb0743f0a3bcbb8ac82fe80ee75549e4176f88480f5660308e27f3bdfa6804a2
                                                          • Opcode Fuzzy Hash: 1174b9e05e0ec077f58f84e71c627ec51327c8a58e7600726c525f8141592f8c
                                                          • Instruction Fuzzy Hash: 29115E22B14F0689EB40CF74E8552B933A4FB187A8F480D31DB6D467B4DF38D19A8344
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                          • String ID:
                                                          • API String ID: 2933794660-0
                                                          • Opcode ID: 82f0f9c915ca38b27df9a13535bd7a8d6766dc117c9a79f3edaf6f20f04facae
                                                          • Instruction ID: ad6d484cff0af42ab3204dceba5e2c48b23b7bd41724aef1367a64a6fb3cfc49
                                                          • Opcode Fuzzy Hash: 82f0f9c915ca38b27df9a13535bd7a8d6766dc117c9a79f3edaf6f20f04facae
                                                          • Instruction Fuzzy Hash: 49111F26B14F0189EB00CB64E8542AC33A4FB59798F440A31EB6D46768DF7CD1988380
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: P_get_type$J_nid2snL_get_current_compression
                                                          • String ID:
                                                          • API String ID: 142675065-0
                                                          • Opcode ID: ef5c6b9377a65607391c5da60103c15d5b34c6cfb642226678b6882f81df31a9
                                                          • Instruction ID: e34ce91fac5381f86123c0e50f712b37cb85c069a35f6e003cfdb1da05249528
                                                          • Opcode Fuzzy Hash: ef5c6b9377a65607391c5da60103c15d5b34c6cfb642226678b6882f81df31a9
                                                          • Instruction Fuzzy Hash: FAF0DA11F0AA0A81FE599F79A85423C1B90AF4CFD0F8C1534CA1E06390DF2CE49B9209
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Dealloc$Eval_Thread$FreeMem_O_free_allObject_RestoreSaveTrackX_free
                                                          • String ID:
                                                          • API String ID: 3459953665-0
                                                          • Opcode ID: e9f5b987bf89cebd02a395e6cf559e4ee373507bedcf57f81c3745492d13cff4
                                                          • Instruction ID: 7d670f372ca3ee73d6e99e40ed4648fbb9f870adec5fd358367349cc66373639
                                                          • Opcode Fuzzy Hash: e9f5b987bf89cebd02a395e6cf559e4ee373507bedcf57f81c3745492d13cff4
                                                          • Instruction Fuzzy Hash: 9FF0D426A08A4A82EB04AF3AE95407D2720FB89FD4F585030DF0E06765CF3CD49A8744
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentImageNonwritableUnwind
                                                          • String ID: csm
                                                          • API String ID: 451473138-1018135373
                                                          • Opcode ID: 88d75f8372be57577a220e465c4aa8d65e851ebfefcdd899ecde71752cd89d28
                                                          • Instruction ID: 1911ac7282d0a1a600da55012aa55ae18aa9c7d6c7652b218789a39cc594925e
                                                          • Opcode Fuzzy Hash: 88d75f8372be57577a220e465c4aa8d65e851ebfefcdd899ecde71752cd89d28
                                                          • Instruction Fuzzy Hash: D5518A32A196028AEB148B29E444A7D37A6FB84FD8F108175EF4E47789EF7DE8459700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: _get_daylight$_invalid_parameter_noinfo
                                                          • String ID: ?
                                                          • API String ID: 1286766494-1684325040
                                                          • Opcode ID: 30789dec6190b383a199f118b84c25ff7dc7ec79571e837530472d1d90a39620
                                                          • Instruction ID: 51ef4fe3176a14be087320c08a13af8fd0cc335049b326a145b0d73c14eefa6b
                                                          • Opcode Fuzzy Hash: 30789dec6190b383a199f118b84c25ff7dc7ec79571e837530472d1d90a39620
                                                          • Instruction Fuzzy Hash: 1941D712A58B8256FB649BA5D4017B9E690EF80FB4F184335EE5D86AF5DF3CD8418700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abort$CreateFrameInfo
                                                          • String ID: csm
                                                          • API String ID: 2697087660-1018135373
                                                          • Opcode ID: a8b8ee24cb783e7d293a6e1db454b28b1bfc46eb23a73e5049af87221528bbc6
                                                          • Instruction ID: 392832909f98bd721152d81fdf2434349de32282aea377b3dfd3a85f62e3835a
                                                          • Opcode Fuzzy Hash: a8b8ee24cb783e7d293a6e1db454b28b1bfc46eb23a73e5049af87221528bbc6
                                                          • Instruction Fuzzy Hash: 12512837618B4286E620AB2AE54066E77A4FB89BD0F141175EF8D07B55DF3CE461DB00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory_invalid_parameter_noinfo
                                                          • String ID: .$:
                                                          • API String ID: 2020911589-4202072812
                                                          • Opcode ID: 7a35d28534e01db8ffeaa6b4fa37230a72ad0a4b96bb2a626ac06d1e353ecb62
                                                          • Instruction ID: 585798f5920ed84ab7eba90bfebe955fa87af950d5bf0fb519b50f26ec400e5e
                                                          • Opcode Fuzzy Hash: 7a35d28534e01db8ffeaa6b4fa37230a72ad0a4b96bb2a626ac06d1e353ecb62
                                                          • Instruction Fuzzy Hash: 28417F22F58F5298FB80DBB198511BC6AB86F14F6CF540235DE5DA7A65EF3C98458300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Name::operator+
                                                          • String ID: void$void
                                                          • API String ID: 2943138195-3746155364
                                                          • Opcode ID: d81aed41cb4c8c5c69bd061dfd49733f36ea67ee8bb27e73bf8cb873ba0293ca
                                                          • Instruction ID: 88fab13a9d7221db55ce7a4ef7a9830240ef83f386551bf3f6982c7ff4297b56
                                                          • Opcode Fuzzy Hash: d81aed41cb4c8c5c69bd061dfd49733f36ea67ee8bb27e73bf8cb873ba0293ca
                                                          • Instruction Fuzzy Hash: 1431F672E18B569CFB01CBA9E8410EC37B0BB48B88B440576EF4E66B59DF38A144D750
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory
                                                          • String ID: :
                                                          • API String ID: 1611563598-336475711
                                                          • Opcode ID: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
                                                          • Instruction ID: 9c0129e4d225e4650168bcad57af644f6667f2ac263b68769772548d71f63256
                                                          • Opcode Fuzzy Hash: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
                                                          • Instruction Fuzzy Hash: B121C122B48A8586EFA0DB15D44427EE3A1FF84F98F454235DB8C836A4DF7CED448740
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_FreeMem_Parse_Size
                                                          • String ID: ascii
                                                          • API String ID: 2971325497-3510295289
                                                          • Opcode ID: a4bb0fd7286f087dd0d96e7648b22da2f1b4b2ca3ec14ac410f5bc383d07f14c
                                                          • Instruction ID: 65a55468022fd4958dd64e73b90c99c7909a2c6f6d1a492bfe743a7ede0ce5ad
                                                          • Opcode Fuzzy Hash: a4bb0fd7286f087dd0d96e7648b22da2f1b4b2ca3ec14ac410f5bc383d07f14c
                                                          • Instruction Fuzzy Hash: D6110A36618B85C5DB10CF2AE88456AB7A4FB88BC0F584035EF8D83B24DF38D456CB48
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: FileHeader$ExceptionRaise
                                                          • String ID: Access violation - no RTTI data!$Bad dynamic_cast!
                                                          • API String ID: 3685223789-3176238549
                                                          • Opcode ID: 161e8b28e34caca24568961a6528755d3751e4ffa6d3c1bec0c9a5cac7a2823b
                                                          • Instruction ID: 6c73673abc1d69b1ecb44269566b90c8db66cd4e404f0cf4ebd56774907a395e
                                                          • Opcode Fuzzy Hash: 161e8b28e34caca24568961a6528755d3751e4ffa6d3c1bec0c9a5cac7a2823b
                                                          • Instruction Fuzzy Hash: F4015AA1A29A47A1EE40DB1CEA601B86361FF80FC4F4464B1EF0E07669EF7CE508D700
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFileHeaderRaise
                                                          • String ID: csm
                                                          • API String ID: 2573137834-1018135373
                                                          • Opcode ID: 96783e5d5ee86e7ed91570add2de904558e3ade983638e121ecc73efc59d9239
                                                          • Instruction ID: 4c9801a3278d9d800279c4bdfbe404c6429760e0a78e99eb6cb20999915a74d2
                                                          • Opcode Fuzzy Hash: 96783e5d5ee86e7ed91570add2de904558e3ade983638e121ecc73efc59d9239
                                                          • Instruction Fuzzy Hash: 78112B32618B4182EB618B29E940269B7E5FB88B98F584270EF8C07B58DF3DD551CB00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_FreeMem_Parse_Size
                                                          • String ID: ascii
                                                          • API String ID: 2971325497-3510295289
                                                          • Opcode ID: 1ccae27e2df3bc9fa8e4b2df3855de555f9f0df4c0960448b76b98603b4e6947
                                                          • Instruction ID: 21be20f9e22956df0470680b12214a963d025264a0b2b4a309a34853df0f42f4
                                                          • Opcode Fuzzy Hash: 1ccae27e2df3bc9fa8e4b2df3855de555f9f0df4c0960448b76b98603b4e6947
                                                          • Instruction Fuzzy Hash: 6C111F31A18B49C1EB108F6AE444B6E77A4FB48BD4F544135EB8D47B18DF7CD4468B48
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3259986105.00007FF615A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF615A20000, based on PE: true
                                                          • Associated: 00000002.00000002.3259944406.00007FF615A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260064010.00007FF615A4B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A5E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260157531.00007FF615A63000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000002.00000002.3260262206.00007FF615A66000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff615a20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFileHeaderRaise
                                                          • String ID: csm
                                                          • API String ID: 2573137834-1018135373
                                                          • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                          • Instruction ID: 315a32233af2962c37bdef8c9b6ab589f4bed42b29f502773b9ab69f260a68ca
                                                          • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                          • Instruction Fuzzy Hash: 20113736619B8482EB218B25E440269B7A4FF88F94F184231DB8D47768EF3CC9518B00
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Arg_CheckObject_PositionalTrue
                                                          • String ID: getpeercert
                                                          • API String ID: 341638686-200429401
                                                          • Opcode ID: 4391be54f3b9744dd8453b216c6fc47e843cf99a3f11d960a72bf402986a61e1
                                                          • Instruction ID: 555d9a88d6cc1a96d0f254e0115d90e97c30a5f8bee6661e6b5196159b51b7f8
                                                          • Opcode Fuzzy Hash: 4391be54f3b9744dd8453b216c6fc47e843cf99a3f11d960a72bf402986a61e1
                                                          • Instruction Fuzzy Hash: E3014432B04A6189E750AF2AA850179BB65FB98FC0F995031EF4D87769CF39E4438704
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: String$Err_FromUnicode_
                                                          • String ID: no such name
                                                          • API String ID: 3678473424-4211486178
                                                          • Opcode ID: 3cee85899810c21b61c883871248d1595a37fae7423a3e6c68c232458049210f
                                                          • Instruction ID: 766de25a36a720499724e8e3ef626e21739273026161d8ad519e2e8c4ac9e880
                                                          • Opcode Fuzzy Hash: 3cee85899810c21b61c883871248d1595a37fae7423a3e6c68c232458049210f
                                                          • Instruction Fuzzy Hash: D9014B71A18B4281FE229B29E8117BD2360BF98BC8F480131DB6E46778DF2CE1448610
                                                          APIs
                                                          Strings
                                                          • Cannot set verify_mode to CERT_NONE when check_hostname is enabled., xrefs: 00007FF8B8B2C07A
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_String$Arg_Parse_Size
                                                          • String ID: Cannot set verify_mode to CERT_NONE when check_hostname is enabled.
                                                          • API String ID: 1619524773-288992553
                                                          • Opcode ID: 5d47b52a9f30d3d19b9c5793d997a53d4bf7f4bf2b3d2087eaa2a6f5e8030f54
                                                          • Instruction ID: 25f4edfe04bd166b69e86d643cab1d9ccfedd6d2b24a2ec799d99332600a49a0
                                                          • Opcode Fuzzy Hash: 5d47b52a9f30d3d19b9c5793d997a53d4bf7f4bf2b3d2087eaa2a6f5e8030f54
                                                          • Instruction Fuzzy Hash: 8BF01D61E0C907C1EA148F7DA45057E2B60AF95BE0FA85232CB1D066A4EF3DE48A8748
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_StringX_get_verify_mode
                                                          • String ID: invalid return value from SSL_CTX_get_verify_mode
                                                          • API String ID: 3939857436-2501269723
                                                          • Opcode ID: f687a6c0c5a4183b4d75922872bd7ac6d5d320f5ad4b6ceb76a9824a91c458d1
                                                          • Instruction ID: 16dcb42a02a1bdfbb36cdaddf5326113ccc4dfa8b938955c034f397e8c16c7cf
                                                          • Opcode Fuzzy Hash: f687a6c0c5a4183b4d75922872bd7ac6d5d320f5ad4b6ceb76a9824a91c458d1
                                                          • Instruction Fuzzy Hash: 0AF03722E19807C1EB195F7DD85517C5761EB48784FA80435C70E866A0CF5CE897C348
                                                          APIs
                                                            • Part of subcall function 00007FF8BA246E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8BA2429EE), ref: 00007FF8BA246E56
                                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8BA24F45A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: abortterminate
                                                          • String ID: csm$f
                                                          • API String ID: 661698970-629598281
                                                          • Opcode ID: f31257b661c57643b6b4b1793288747ab2a9155158c122d579431834bbccefac
                                                          • Instruction ID: 458d760605b96a84ea5506f0c33ef8d16aa9aaeeb83d23d9fa14b26964d5d85a
                                                          • Opcode Fuzzy Hash: f31257b661c57643b6b4b1793288747ab2a9155158c122d579431834bbccefac
                                                          • Instruction Fuzzy Hash: 7BE06D32D0875381FB216B69B28013D26A4AF89FD4F14C0B4EF4806686CE3DD8A4A701
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Capsule_ImportModule_State
                                                          • String ID: _socket.CAPI
                                                          • API String ID: 2652237932-3774308389
                                                          • Opcode ID: f6bb12bf27002d4cccd5b8b37b61f5c59dc24c3f8fd27b4ee6771e3e226dd6f3
                                                          • Instruction ID: 93d18d220ff059c698360b492f08196fd4e87f465ced4f169f659d6dfb4994ae
                                                          • Opcode Fuzzy Hash: f6bb12bf27002d4cccd5b8b37b61f5c59dc24c3f8fd27b4ee6771e3e226dd6f3
                                                          • Instruction Fuzzy Hash: 3EE01A20A1A60781FE148FB9946527C67A0AF59BA0FA84535CA2D822A0DF3CE486C318
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3267386125.00007FF8B8B21000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B8B20000, based on PE: true
                                                          • Associated: 00000002.00000002.3267342079.00007FF8B8B20000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267454200.00007FF8B8B2D000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267519342.00007FF8B8B40000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267586768.00007FF8B8B41000.00000008.00000001.01000000.00000012.sdmpDownload File
                                                          • Associated: 00000002.00000002.3267643901.00007FF8B8B49000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b8b20000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Err_Object_StringTrue
                                                          • String ID: cannot delete attribute
                                                          • API String ID: 1323943456-1747274469
                                                          • Opcode ID: 2f8d69dcfa5688d08a09282bc1e201520617e2f06cf13dd042f272955c3b830a
                                                          • Instruction ID: f90380beb9e98875f704bc3298ebd032ff517bbbce7a8828c0ecfef2de2353c3
                                                          • Opcode Fuzzy Hash: 2f8d69dcfa5688d08a09282bc1e201520617e2f06cf13dd042f272955c3b830a
                                                          • Instruction Fuzzy Hash: 96E06D64A08806C1EB14EF3D94850382751AF547E5FA44A31CB2D462E4DF2C948E8308
                                                          APIs
                                                          • _PyObject_GC_New.PYTHON311(?,?,00000000,00007FF8B7DE2533), ref: 00007FF8B7DE25B6
                                                          • PyObject_GC_Track.PYTHON311(?,?,00000000,00007FF8B7DE2533), ref: 00007FF8B7DE25E8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3266207103.00007FF8B7DE1000.00000020.00000001.01000000.00000010.sdmp, Offset: 00007FF8B7DE0000, based on PE: true
                                                          • Associated: 00000002.00000002.3266148560.00007FF8B7DE0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7DE5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E42000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E8E000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E91000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7E96000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266268765.00007FF8B7EF0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266902753.00007FF8B7EF3000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000002.00000002.3266961919.00007FF8B7EF5000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8b7de0000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: Object_$Track
                                                          • String ID: 3.2.0
                                                          • API String ID: 16854473-1786766648
                                                          • Opcode ID: 767dd7ab98994f43239e4e329e749c2ad7475791c86a6fb4d160e6b955e6c056
                                                          • Instruction ID: b219b9c88a98a8d35e9e7849875c8b1b08c7ed5cf40d26bac9372b8ce82821ae
                                                          • Opcode Fuzzy Hash: 767dd7ab98994f43239e4e329e749c2ad7475791c86a6fb4d160e6b955e6c056
                                                          • Instruction Fuzzy Hash: F8E0E524A09F0695EF168F19A89006C32A4BF0CBC4B8C0239CF6E02378EF3DE264C350
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,00007FF8BA246CE9,?,?,?,?,00007FF8BA250582,?,?,?,?,?), ref: 00007FF8BA246E83
                                                          • SetLastError.KERNEL32(?,?,?,00007FF8BA246CE9,?,?,?,?,00007FF8BA250582,?,?,?,?,?), ref: 00007FF8BA246F0C
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.3271320577.00007FF8BA241000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF8BA240000, based on PE: true
                                                          • Associated: 00000002.00000002.3271278440.00007FF8BA240000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271565433.00007FF8BA253000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271649077.00007FF8BA258000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                          • Associated: 00000002.00000002.3271708065.00007FF8BA259000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ff8ba240000_Q3pEXxmWAD.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast
                                                          • String ID:
                                                          • API String ID: 1452528299-0
                                                          • Opcode ID: 29fbcb28d85caf8942357daff49778de6b87ab13b42ab574bfe6367f35ca65f9
                                                          • Instruction ID: 746588043d73c163ac0dd1dd4733ab3771e59cb8a0c4443e05280a01afe1c01b
                                                          • Opcode Fuzzy Hash: 29fbcb28d85caf8942357daff49778de6b87ab13b42ab574bfe6367f35ca65f9
                                                          • Instruction Fuzzy Hash: 1C113D20F1964382FA149B2DA95017522D1BF48BE0F4446B4EF6E07BD5DE3DF841BB10